DK3143_half-series-title.qxd
9/12/05
8:27 AM
Page A
Chaos in Automatic Control
DK3143_half-series-title.qxd
9/12...
254 downloads
1247 Views
7MB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
DK3143_half-series-title.qxd
9/12/05
8:27 AM
Page A
Chaos in Automatic Control
DK3143_half-series-title.qxd
9/12/05
8:27 AM
Page C
CONTROL ENGINEERING A Series of Reference Books and Textbooks Editor FRANK L. LEWIS, PH.D. Professor Applied Control Engineering University of Manchester Institute of Science and Technology Manchester, United Kingdom
1. 2. 3. 4. 5. 6. 7.
8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
Nonlinear Control of Electric Machinery, Darren M. Dawson, Jun Hu, and Timothy C. Burg Computational Intelligence in Control Engineering, Robert E. King Quantitative Feedback Theory: Fundamentals and Applications, Constantine H. Houpis and Steven J. Rasmussen Self-Learning Control of Finite Markov Chains, A. S. Poznyak, K. Najim, and E. Gómez-Ramírez Robust Control and Filtering for Time-Delay Systems, Magdi S. Mahmoud Classical Feedback Control: With MATLAB, Boris J. Lurie and Paul J. Enright Optimal Control of Singularly Perturbed Linear Systems and Applications: High-Accuracy Techniques, Zoran Gajif and Myo-Taeg Lim Engineering System Dynamics: A Unified Graph-Centered Approach, Forbes T. Brown Advanced Process Identification and Control, Enso Ikonen and Kaddour Najim Modern Control Engineering, P. N. Paraskevopoulos Sliding Mode Control in Engineering, edited by Wilfrid Perruquetti and Jean-Pierre Barbot Actuator Saturation Control, edited by Vikram Kapila and Karolos M. Grigoriadis Nonlinear Control Systems, Zoran Vukić, Ljubomir Kuljača, Dali Donlagič, Sejid Tesnjak Linear Control System Analysis & Design: Fifth Edition, John D’Azzo, Constantine H. Houpis and Stuart Sheldon Robot Manipulator Control: Theory & Practice, Second Edition, Frank L. Lewis, Darren M. Dawson, and Chaouki Abdallah Robust Control System Design: Advanced State Space Techniques, Second Edition, Chia-Chi Tsui Differentially Flat Systems, Hebertt Sira-Ramirez and Sunil Kumar Agrawal Chaos in Automatic Control, edited by Wilfrid Perruquetti and Jean-Pierre Barbot
DK3143_half-series-title.qxd
9/12/05
8:27 AM
Page i
Chaos in Automatic Control edited by
Wilfrid Perruquetti Ecole Centrale de Lille Villeneuve-d’Ascq Cedex, France
Jean-Pierre Barbot Equipe Commande des Systèmes Cergy-Pontoise Cedex, France
Boca Raton London New York
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa plc.
DK3143_Discl.fm Page 1 Friday, September 9, 2005 1:43 PM
Published in 2006 by CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2006 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-10: 0-8247-2653-7 (Hardcover) International Standard Book Number-13: 978-0-8247-2653-9 (Hardcover) Library of Congress Card Number 2005050539 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data Chaos in automatic control / edited by Wilfrid Perruquetti, Jean-Pierre Barbot. p. cm. -- (Control engineering (Taylor & Francis)) Includes bibliographical references and index. ISBN 0-8247-2653-7 (alk. paper) 1. Automatic control. 2. Chaotic behavior in system. I. Perruquetti, Wilfrid. II. Barbot, Jean-Pierre, 1958- III. Series. TJ213.C468 2005 629.8--dc22
2005050539
Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com Taylor & Francis Group is the Academic Division of Informa plc.
and the CRC Press Web site at http://www.crcpress.com
0882-Perruquetti-FM_R2_0120905
Dedication
This book is dedicated to Valérie, Isabelle, Marius, Rosalie, Thomas, Tristan, and Baptiste
0882-Perruquetti-FM_R2_0120905
0882-Perruquetti-FM_R2_0120905
Preface
Motivations Chaotic dynamics, first espoused by the French mathematician Henri Poincaré (1854–1912), has received considerable attention over the years since. In 1963, when simulating a simplified model of convection, Edward Lorenz highlighted its unpredictable nature, great sensitivity to initial conditions, and strange attractors. Well-known qualitative methods for studying nonlinear system models and the notion of bifurcation in the phase plane have been largely inspired from the works of Andronov (first published in 1937). Over the years, chaotic phenomena have been mainly investigated from an analysis point of view. Since 1990, considerable developments have occurred in the control and observation of chaotic systems. A huge number of applications have been proposed in the fields of circuit systems, mechanics, physics, avionics, weather forecasting, and more recently, secure communications and cryptography. Around this time, people started considering these problems and several active researchers in this field combined their efforts, thanks to the support of many French institutions.1 Several tools on normal forms, bifurcations, and chaos have been presented. An international workshop was organized in Lille (September 2003) with the intention of: •
bringing together researchers from different areas of engineering who were interested in chaotic systems;
•
promoting some new concepts of modern control theory dedicated to chaotic systems;
•
overviewing some recent developments on chaos control for physical and industrial applications.
After this meeting, it was decided by the contributors to collate and present all the theoretical and pedagogical material in a book. The major goal being to cover advanced topics adopted from the field of automatic control in the specific context of control and observation for chaotic systems. In addition, the aim of the book is to familiarize the control systems community with chaos theory and to equip the specialists of chaotic 1 CNRS, GdR Macs, GRAISyHM, LAGIS, ECE-ENSEA, Ecole Centrale de Lille, and so on.
0882-Perruquetti-FM_R2_0120905
dynamics with many of the most recent advances in modern control theory. A deterministic point of view (using ordinary differential equations and difference equations) is chosen to tackle chaotic systems: this choice is justified by the extended results available on this subject and by the huge number of application domains. The book is organized as follows: 1. The models addressed are mainly ordinary differential (or difference) equations, but these concepts may be analyzed within the framework of other models such as partial differential equations, delay differential equations, algebra differential equations, and so on. 2. Chaos theory is gradually introduced starting from bifurcation theory. More precisely, our focus is on the stability analysis of control schemes dedicated to chaotic systems; however, some ergodic arguments are involved when dealing with the well-known and efficient Ott– Grebogy–York (OGY) method. Nevertheless, in this case we highlight the interest of such an approach and refer to the literature, for more detail, such as the well-known Taken’s theorem. 3. As a consequence of the preceding point, the usefulness of tools from control problems such as analysis (stability, observability, controllability, etc.), and design of controller or observer, are particularly highlighted for chaotic systems. 4. The Poincaré normal form was a starting point for some analytical purposes, but recent and important contributions have been made by Wei Kang and Art Krener for the normal form to some analysis and control design. 5. A possible interpretation of the synchronization problem as an observer design problem comes from a well-known paper by Henk Nijmeijer and Ian Marels. However, there also exist some other historical points of view such as those of the Pecorra and Carol. Some of them are discussed here. 6. As the application domains are varied, for example, aeronautics, biology, chemistry, economy, and so on, we only tackle telecommunication and electrical drive problems. Obviously, all these choices lead to a non-exhaustive presentation of chaos and some important theoretical parts are only very briefly tackled or mentioned. The ergodic approach, presented very briefly in Chapter 6, uses ergodic arguments to explain not only the well-known control schemes such as the OGY and Pyragas methods but also a new one based on H∞ concepts. The usefulness and potential of the proposed deterministic methods are undeniable. It is also obvious that future developments of the theories proposed here may be carried out using some ergodic arguments.
0882-Perruquetti-FM_R2_0120905
Book Overview To achieve the aforementioned goals, and more specifically to deal with fundamental theoretical backgrounds and an interdisciplinary presentation of emergent methods and applications, we organize the book in three parts.
Part I: Open-Loop Analysis As the meeting was mainly attended by physicists and control people, we decided, for pedagogical reasons, to present some mathematical background on ordinary differential equations and difference equations to understand the concepts involved in the following chapters. This constitutes the core of open-loop analysis: •
Chapter 1: an historical, theoretical overview of the discrete time system (difference equations) is given by C. Mira (one of the pioneers in chaos theory). His background information allows the reader to easily understand analysis and design tools using mathematical descriptions.
•
Chapter 2: background on ordinary differential equations is presented in this chapter and concerns the notion of solutions, and their qualitative properties (equilibrium points, limit cycle and strange attractor, asymptotic behavior, etc.).
•
Chapter 3: background on Poincaré normal form is recalled to investigate specific bifurcation phenomenon such as Hopf bifurcation.
•
Chapter 4: this chapter describer in details was the approach of Poincaré using homogeneous and found transformations, generalize, to nonlinear control systems. A variety of usual and canouical forms under the action of nonlinear feedback is presented. Applications to feedforward systems and to symmetries are Geocuetic aspects of the presented results are discussed.
•
Chapter 5: some systems inherently have a two time-scale behavior captured by a ”singular perturbation” approach. This chapter focuses on the interconnection between chaos and singular perturbation phenomenon.
Part II: Closed-Loop Design Some problems arising in observation (synchronization and observability bifurcation) and control (chaotic and hyperchaotic control and control
0882-Perruquetti-FM_R2_0120905
bifurcation) are typically closed-loop-oriented. This is the area covered in this part. •
Chapter 6: chaotic systems feature unstable periodic orbits and sensitivity to parameters, initial conditions, and external disturbances. To cope with such behavior, some classical model-independent control methods are recalled (OGY and Pyragas). Then, other strategies such as H∞ , sliding modes, adaptive control, and energy-based control are presented. Finally, recent methods are reported to deal with the control of hyperchaotic systems.
•
Chapter 7: to deal with chaos synchronization, polytopic observers design is developed for a special class of chaotic systems through the notion of polyquadratic stability.
•
Chapter 8: as the Poincaré’s theory of normal forms for uncontrolled dynamical systems uses homogeneous transformations, a variety of control system normal forms were derived using extended homogeneous transformations. This chapter reports on a unified framework of these normal forms.
•
Chapter 9: similar to the previous chapter, observability normal forms are introduced and applied to some synchronization problems.
•
Chapter 10: for synchronization, observer design in the case of nonlinear system with a linear detectable part is important. The Kazantzis– Kravaris and the Kreisselmeier–Engel methods are compared in this chapter.
Part III: Some Applications This part covers applications and also presents illustrative examples of chaos-based engineering. They are related to wireless transmissions, optics, power electronics, and cryptography using chaos. •
Chapter 11: different modulation schemes that allow the transmission of some information with chaotic carriers are described in the context of microwaves.
•
Chapter 12: code division multiple access (CDMA) is shown to be closely related to chaos-based encryption. Moreover, a nonlinear delay differential equation related to optics and optoelectronics is shown, which act as chaos generators.
•
Chapter 13: the appearance of self-sustained oscillations in highperformance AC drives, and in particular in field-oriented control of induction motors, due to the existence of Hopf bifurcations, is discussed.
0882-Perruquetti-FM_R2_0120905
•
Chapter 14: Chua’s circuit combined with an analog circuit observer designed step by step to obtain a chaos-based secure communications channel.
•
Chapter 15: this chapter is the discrete counterpart of the previous chapter because it addresses a discrete time cryptography point of view based on the inclusion method (DCCIM). This chapter provides a practical implementation of techniques developed in Chapter 9 based on the use of observability normal forms and observability bifurcation analysis.
0882-Perruquetti-FM_R2_0120905
0882-Perruquetti-FM_R2_0120905
Acknowledgments
The authors are indebted to their institutions (LAGIS UMR CNRS 8146, Ecole Centrale de Lille, ECS and ENSEA), and to CNRS, GdR Macs, and GRAISyHM. These institutions provided us with the facilities for organizing an International Workshop at Lille (LISAC 03, September 2003) and, in addition, some of these institutions also provided us with a good environment for the editing and completion of this book. Thanks to Zheng Gang, a Ph.D. student of Professor J.-P. Barbot for his help in the conception of the cover figure.
0882-Perruquetti-FM_R2_0120905
0882-Perruquetti-FM_R2_0120905
About the Editors
Wilfrid Perruquetti was born in 1968 at Saint Gilles, France. In 1991, he received his M.Sc. in automatic control from the Institut Industriel du Nord. In 1994, he obtained his Ph.D. in automatic control and then joined the Ecole Centrale de Lille as an Assistant Professor in 1995. Since 2002, after receiving the ”Habilitation à Diriger les Recherches” in 2001, he has held a full Professor’s position at the same institute. He has published over sixty books, journal articles, and conference papers and is the co-editor with Jean-Pierre Barbot of the book Sliding Mode Control in Engineering (Marcel Dekker). He is currently working on stability analysis (including various kinds of stability concepts), stabilization (in particular, finite stabilization), and sliding mode control of nonlinear and delay systems.
0882-Perruquetti-FM_R2_0120905
Jean-Pierre Barbot was born in 1958 in Paris, France. He is the director of the ECS Laboratory and full professor of control systems at Ecole Nationale Supérieure d’Electronique et de ses Applications (ENSEA), Cergy, France. He received the Agrégation (1985) in electrical engineering from the Ecole Normale Supérieur (ENS) de Cachan, France, and Ph.D. (1989) and “Habilitation à diriger des recherches” (1997) from the University of Paris XI, Orsay, France. He has published hundreds of patents, book chapters, journal and conference papers and is the co-editor with Wilfrid Perruquetti of the book Sliding Mode Control in Engineering (Marcel Dekker). He has been a visiting professor at several international universities. He is currently working on chaos synchronization (more particularly, observability normal form), hybrid systems, and sliding mode observer, and his application domains are cryptography and electrical drive.
0882-Perruquetti-FM_R2_0120905
Contributors
J. Aracil Escuela Superior de Ingenieros Universidad de Sevilla Sevilla, Spain
J.-P. Barbot Equipe Commande des Systèmes (ECS) ENSEA, Cergy Pontoise France
I. Belmouhoub Equipe Commande des Systèmes (ECS) ENSEA, Cergy Pontoise France
L. Boutat-Baddas CRAN-CNRS UMR UHP, Nancy France
J. Daafouz CRAN-CNRS UMR INPL, Nancy France
M. Djemai Equipe Commande des Systèmes (ECS) ENSEA, Cergy Pontoise France
F. Gordillo Escuela Superior de Ingenieros Universitad de Sevilla Sevilla, Spain J. Guittart IRCOM CNRS Université de Limoges IUT Jules Valles France W. Kang Department of Mathematics Naval Postgraduate School Monterey, California, USA A.J. Krener Department of Mathematics University of California Davis, California, USA L. Larger LOPMD-CNRS Université de Franche-Conté L. Laval Equipe Commande des Systèmes (ECS) ENSEA, Cergy Pontoise France G. Millerioux CRAN-CNRS UMR UHP, Nancy France
0882-Perruquetti-FM_R2_0120905
C. Mira Cellule d’Etude des Systèmes Non Linéaires et Applications (CESNLA) Quint Fonsegrives France Instituto di Scienze Economidre University of Urbino, Italie J.C. Nallatamby IRCOM CNRS Université de Limoges IUT Jules Valles, France R. Oritega Laboratoire des Signaux et Systèmes LSS/CNRS/Supelec Gif Sur Yvette, France W. Perruquetti LAGiS-CNRS Ecole Centrale de Lille Villeneuve-d’Ascq, France R. Quere IRCOM CNRS Université de Limoges IUT Jules Valles, France S. Ramdani Laboratoire EDM Université de Montpellier I Montpellier, France
W. Respondek Laboratoire de Mathématiques INSA de Rouen Mont Saint Aignan, France F. Sales Escuela Superior de Ingenieros Universidad de Sevilla Sevilla, Spain I.A. Tall Department of Mathematics Natural Science Division Tougaloo College, Mississippi USA R. Tauleigne Equipe Commande des Systémes (ECS) ENSEA Cergy Pontoise France C. Dang Vu-Delcarte LiMSi-CNRS Université de Paris-sud VI Orsay, France M. Xiao Department of Mathematics Southern Illinois University Carbondale, Illinois, USA
0882-Perruquetti-FM_R2_0120905
Series Introduction
Many textbooks have been written on control engineering, describing new techniques for controlling systems, or new and better ways of mathematically formulating existing methods to solve the ever-increasing complex problems faced by practicing engineers. However, only a few of these books fully address the application aspects of control engineering. It is the intention of this series to redress this situation. This series will stress on application issues, and not just the mathematics of control engineering. It will provide text that presents not only new and well-established techniques, but also detailed examples of the application of these methods to the solution of real-world problems. The authors will be chosen from both the academic and the relevant application sectors. There are already many exciting examples of the application of control techniques in the established fields of electrical, mechanical (including aerospace), and chemical engineering. We only have to look around in today’s highly automated society to see the use of advanced robotic techniques in the manufacturing industries, the use of automated control and navigation systems in air and surface transport systems, the increasing use of intelligent control systems in the many artifacts available to the domestic consumer market, and the reliable supply of water, gas, and electrical power to the domestic consumer and to industry. However, there are many challenging problems that could benefit from wider exposure to the applicability of control methodologies, and the systematic system-oriented basis inherent in the application of control techniques. This series presents books that draw on expertise from both the academic world and the applications domains, and will be useful not only as academically recommended course texts but also as handbooks for practitioners in many application domains. Chaos in Automatic Control is another outstanding entry in CRC’s Control Engineering Series.
0882-Perruquetti-FM_R2_0120905
0882-Perruquetti-FM_R2_0120905
Contents
Part I
Open-Loop Analysis . . . . . . . . . . . . . . . . . . . . . . . . .
1
1. Bifurcation and Chaos in Discrete Models: An Introductory Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C. Mira
3
2. Tools for Ordinary Differential Equations Analysis . . . . . . . . W. Perruquetti
45
3. Normal Forms and Bifurcations of Vector Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 C. Dang Vu-Delcarte 4. Feedback Equivalence of Nonlinear Control Systems: A Survey on Formal Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 137 W. Respondek and I. A. Tall 5. Singular Perturbation and Chaos . . . . . . . . . . . . . . . . . . . . . . 263 M. Djemai and S. Ramdani
Part II
Closed-Loop Design . . . . . . . . . . . . . . . . . . . . . . . . 289
6. Control of Chaotic and Hyperchaotic Systems . . . . . . . . . . . . 291 L. Laval 7. Polytopic Observers for Synchronization of Chaotic Maps . . . 323 G. Millérioux and J. Daafouz 8. Normal Forms of Nonlinear Control Systems . . . . . . . . . . . . . 345 W. Kang and A. J. Krener 9. Observability Bifurcations: Application to Cryptography . . . . 377 J.-P. Barbot, I. Belmouhoub, and L. Boutat-Baddas 10. Nonlinear Observer Design for Smooth Systems . . . . . . . . . . 411 A.J. Krener and M. Xiao
0882-Perruquetti-FM_R2_0120905
Part III
Some Applications . . . . . . . . . . . . . . . . . . . . . . . . . 423
11. Chaos and Communications . . . . . . . . . . . . . . . . . . . . . . . . . . 425 R. Quéré, J. Guittard, and J.C. Nallatamby 12. Chaos, Optical Systems, and Application to Cryptography . . . 453 L. Larger 13. Indirect Field-Oriented Control of Induction Motors: A Hopf Bifurcation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 Francisco Gordillo, Francisco Salas, Romeo Ortega, and Javier Aracil 14. Implementation of the Chua’s Circuit and its Application in the Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 L. Boutat-Baddas, J.-P. Barbot, and R. Tauleigne 15. Synchronization of Discrete-Time Chaotic Systems for Secured Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 I. Belmouhoub and M. Djemai Appendix A. On Ergodic Theory of Chaos . . . . . . . . . . . . . . . 553 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
0882-Perruquetti-FM_R2_0120905
List of Figures
2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 2.19 3.1 3.2 3.3 3.4 3.5 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 6.1 6.2
Unit circle: simulation of (2.13) . . . . . . . . . . . . . . . . . . . . . . Infinite number of solutions to the CP of (2.14) . . . . . . . . . . . Euler approximates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Limit cycle of (2.24) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Periodic closed orbit of the Van der Pol oscillator (2.25) . . . . Homoclinic orbit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Heteroclinic orbit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Invariance of A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stability of the A and its stability domain Ds (A) . . . . . . . . . . Attractivity of the set A and its attractivity domain Da (A) . . . Equilibrium (1, 0) is attractive and unstable . . . . . . . . . . . . . Poincaré section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Branch of equilibrium . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hopf bifurcation of (2.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . Saddle–node bifurcation of (2.43) . . . . . . . . . . . . . . . . . . . . . Saddle–node bifurcation with y˙ = −y . . . . . . . . . . . . . . . . . Transcritical bifurcation of (2.44) . . . . . . . . . . . . . . . . . . . . . Fork bifurcation of (2.45) . . . . . . . . . . . . . . . . . . . . . . . . . . . Rösler attractor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hopf bifurcation diagrams . . . . . . . . . . . . . . . . . . . . . . . . . The Poincaré–Bendixson annulus . . . . . . . . . . . . . . . . . . . . α (νc ) < 0 and a1 < 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bifurcation diagram for the Rössler model . . . . . . . . . . . . . . Correspondence between (r, z) and (r, φ, z) . . . . . . . . . . . . . The Chua’s cubic electronic oscillator . . . . . . . . . . . . . . . . . . Chua’s cubic attractor for µ = 2 (5.30) with initial conditions: x0 = 0.5, y0 = −0.5, z0 = 1 . . . . . . . . . . . . . . . . . Slow manifold M0 associated to system (5.30) . . . . . . . . . . . A representation of the slow manifold M0 of Chua’s cubic system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The global motion of the Chua’s cubic system . . . . . . . . . . . The chaotic attractor of the HR model obtained by numerical integration for K = 3.18 and ε = 0.004 . . . . . . . . . . . . . . . . . . The chaotic temporal evolutions x(t) . . . . . . . . . . . . . . . . . . The chaotic temporal evolutions y(t) . . . . . . . . . . . . . . . . . . The chaotic temporal evolutions z(t) . . . . . . . . . . . . . . . . . . Chaotic trajectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Poincaré section and an UPO . . . . . . . . . . . . . . . . . . . .
54 55 56 64 66 67 67 68 69 71 73 87 90 91 93 93 94 95 96 122 122 123 133 134 276 277 278 279 279 281 282 283 284 295 296
0882-Perruquetti-FM_R2_0120905
6.3 6.4 6.5 6.6 7.1 7.2 7.3 8.1 9.1 9.2 9.3 9.4 9.5 9.6 9.7 9.8 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 11.10 11.11 11.12 11.13 11.14 11.15 11.16 11.17 11.18 11.19
Schematic explanation of OGY method . . . . . . . . . . . . . . . . Schematic representation of the Pyragas control scheme . . . . The (linear) H∞ control scheme . . . . . . . . . . . . . . . . . . . . . . . Schematic representation of the YLM method . . . . . . . . . . . Message-embedded scheme . . . . . . . . . . . . . . . . . . . . . . . . ˆ k , (c) plaintext mk , and (a) Error xk − xˆ k , (b) error mk − m ˆk . . . . . . . . . . . . . . . . . . . . . . . . . . (d) recovered plaintext m Decoder capture screens: matched and mismatched keys . . . The configuration of ball and beam system . . . . . . . . . . . . . . Bidirectional synchronization . . . . . . . . . . . . . . . . . . . . . . . Unidirectional synchronization . . . . . . . . . . . . . . . . . . . . . . Inclusion method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Addition method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Chua circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Observation errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rossler map phase portrait . . . . . . . . . . . . . . . . . . . . . . . . . Three steps convergence of signal observation error . . . . . . . Architecture of the master–slave synchronization of two chaotic systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Phase portrait of the Lorenz system in the chaotic regime for σ = 16, b = 4, and r = 45.92 . . . . . . . . . . . . . . . . . . . . . . . . . x1 waveforms corresponding to: (a) synchronization and (b) lack of synchronization . . . . . . . . . . . . . . . . . . . . . . . . . Plots of the error signal versus time for a perfect match of the emitter and receiver parameters . . . . . . . . . . . . . . . . . . . . . Plots of the magnitude of the error signal in the case of a mismatch of master and slave parameters . . . . . . . . . . . . . . Architecture of a feedback-type chaotic synchronization . . . Example of a non-autonomous synchronization system based on an inverse system . . . . . . . . . . . . . . . . . . . . . . . . . Typical coder–decoder based on an inverse chaotic system . . Example of a coherent CSK system . . . . . . . . . . . . . . . . . . . Architecture of a COOK system . . . . . . . . . . . . . . . . . . . . . . Architecture of a DCSK system . . . . . . . . . . . . . . . . . . . . . . General architecture of the chaotic oscillator . . . . . . . . . . . . Schematic of the VCO used for the chaotic oscillator . . . . . . Frequency of the oscillations of the VCO versus the control voltage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Amplitude of the oscillations of the VCO versus the control voltage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chaotic oscillator T/τ = 64 Vc0 = −4 V . . . . . . . . . . . . . . . . Bifurcation diagram of the chaotic oscillator for α = 314rd . . Bifurcation diagram of the chaotic oscillator for α = 628rd . . Transient set-up of a two-frequencies steady state regime . . .
297 300 304 314 334 339 340 366 379 380 394 394 395 397 399 402 427 429 430 430 431 432 432 434 435 435 436 437 438 441 442 442 444 444 445
0882-Perruquetti-FM_R2_0120905
11.20 11.21 11.22 11.23 11.24 11.25 12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8 12.9 12.10 12.11 12.12 12.13 12.14 12.15 12.16 12.17 13.1 13.2 13.3 13.4 13.5 13.6 14.1 14.2 14.3 14.4 14.5 14.6 14.7 14.8 14.9
Spectrum of the output signal in the chaotic regime . . . . . . . Architecture of the chaotic modulator . . . . . . . . . . . . . . . . . Structure of the chaotic receiver (demodulator) . . . . . . . . . . Transmitted and received signals in the case of a perfect match between parameters . . . . . . . . . . . . . . . . . . . . . . . . . Transmitted and received signals in the case of a 10% mismatch between parameters . . . . . . . . . . . . . . . . . . . . . . The BER of the chaotic modulator–demodulator . . . . . . . . . Typical transmission system using chaos encryption . . . . . . Bloc diagram of the scalar nonlinear delayed dynamic . . . . . Bifurcation diagram calculated from Equation (12.2) . . . . . . Bloc diagram in the adiabatic approximation situation . . . . . Bifurcation diagram calculated from a mapping using β f [·] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Ikeda ring cavity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The wavelength chaos generator . . . . . . . . . . . . . . . . . . . . . Experimental trajectories in time and frequency domain . . . Experimental bifurcation diagrams . . . . . . . . . . . . . . . . . . . Bloc diagram for chaos replication and decoding . . . . . . . . . Replication error against parameter mismatch . . . . . . . . . . . Set-up of the wavelength chaos receiver–decoder . . . . . . . . . Experimental traces while encoding and decoding a sine waveform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Electrooptic intensity chaos emitter . . . . . . . . . . . . . . . . . . . Emitter–receiver set-up using chaos in coherence modulation Basic ECLD set-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Direct optoelectronic feedback in an SC laser . . . . . . . . . . . . Transversality condition for a Hopf bifurcation . . . . . . . . . . Supercritical Hopf bifurcation . . . . . . . . . . . . . . . . . . . . . . . Representation of Equation (13.14) for c1 = 4, c2 = 4, c4 = 1, c5 = 1, and u02 = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Root locus for c1 = 4, c2 = 4, c4 = 1, c5 = 1, u02 = 1, kp = 0.1, ki = 1 and τL = 0.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Values of κ corresponding to a Hopf bifurcation vs. τL . . . . . Evolution of x3 in the four simulations . . . . . . . . . . . . . . . . . Additive chaos masking . . . . . . . . . . . . . . . . . . . . . . . . . . . The chaotic parameter modulation . . . . . . . . . . . . . . . . . . . Chua’s circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Current–voltage characteristic of the negative resistance . . . Elaboration of a negative resistance . . . . . . . . . . . . . . . . . . . The negative resistance with double slope . . . . . . . . . . . . . . Real current–voltage characteristic . . . . . . . . . . . . . . . . . . . . Complete implementation of the Chua’s circuit . . . . . . . . . . Route to chaos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
447 447 448 448 449 450 456 459 460 461 461 462 464 465 466 468 469 471 471 474 475 476 477 484 484 488 489 490 492 504 504 505 506 506 507 507 508 509
0882-Perruquetti-FM_R2_0120905
14.10 14.11 14.12 14.13 14.14 14.15 14.16 14.17
14.18
14.19
14.20
14.21 15.1 15.2 15.3 15.4 15.5 15.6 15.7 15.8 15.9 15.10 15.11 15.12 15.13
Parlitz’s experience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Double scroll attractor for system (14.2) and system (14.3) . . Double scroll attractor for system (14.2) and system (14.4) . . Observation error for system (14.2) and system (14.3) . . . . . . Observation error for system (14.2) and system (14.4) . . . . . . Double scroll attractor for system (14.2) and system (14.5) . . Observation error for system (14.2) and system (14.5) . . . . . . Double scroll attractor for systems (14.6) and (14.8), when we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ) . . . . . . . . . . . . . . . . . . . . . x4 , x4 , xˆ 4 , Es , and the singularity (x2 + R0 x3 ), when we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Double scroll attractor for systems (14.6) and (14.8), when we set Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ) . . . . . . . . . . . . . . . . . . . . . x4 , x4 , xˆ 4 , Es , and the singularity (x2 + R0 x3 ), when we set Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transmission examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . Phase portrait of Burgers map . . . . . . . . . . . . . . . . . . . . . . . Phase portrait of the observer . . . . . . . . . . . . . . . . . . . . . . . Observation error dynamics on x1 and x2 . A zoom on the first 10 iterations (10 stars) . . . . . . . . . . . . . . . . . . . . . . . . . . Phase portrait of the Mandelbrot map for a = 0.2, b = −0.7, c = 0.8, and d = 0.291 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Three-dimensional bifurcations diagram . . . . . . . . . . . . . . . Bifurcations diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mandelbrot map’s phase portrait for c = 0.95 . . . . . . . . . . . . Arnold’s tongue for the Mandelbrot map . . . . . . . . . . . . . . . The original and recovered picture . . . . . . . . . . . . . . . . . . . The ciphered picture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . An example of ciphering/decifering a text file by the CCMID Original text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ciphered text (Figure 15.12) by the Mandelbrot map (in simple precision) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
510 513 513 514 514 516 516
521
522
522
523 523 529 530 533 542 543 544 544 545 548 548 549 549 549
0882-Perruquetti-ch01_R2_280705
Part I
Open-Loop Analysis
0882-Perruquetti-ch01_R2_280705
0882-Perruquetti-ch01_R2_280705
1 Bifurcation and Chaos in Discrete Models: An Introductory Survey
C. Mira
CONTENTS 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Chaos and Unpredictability . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Generalities on Discrete Models . . . . . . . . . . . . . . . . . . . . . 1.3.1 Different Forms of Models . . . . . . . . . . . . . . . . . . . . 1.3.2 Maps Obtained from an ODE by a Poincaré Section . 1.4 Singularities and Bifurcations Common to Invertible and Noninvertible Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4.1 Singularities and Bifurcations . . . . . . . . . . . . . . . . . 1.4.2 Bifurcation Sets: Normal Forms of Exceptional Critical Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4.3 Singularities Sense when the Map is Obtained from a Poincaré Section . . . . . . . . . . . . . . . . . . . . . . 1.5 Map Singularities and Bifurcations Specific to Noninvertible Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5.1 Singularities and Bifurcations Induced by Noninvertible Maps . . . . . . . . . . . . . . . . . . . . . . . . 1.5.2 Fractal Bifurcations Structure of “Embedded Boxes” Type and Chaotic Behaviors . . . . . . . . . . . . . . . . . . 1.5.3 Homoclinic and Heteroclinic Situations: Their Bifurcations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Absorbing Areas, Chaotic Areas, Bifurcations . . . . . . . . . . . 1.6.1 Definitions and Properties . . . . . . . . . . . . . . . . . . . . 1.6.2 Chaotic Areas: Microscopic and Macroscopic Points of View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Results on Basins and their Bifurcations . . . . . . . . . . . . . . . 1.8 Map Models with a Vanishing Denominator . . . . . . . . . . . 1.9 Noise and Chaos: Characterization of Chaotic Behaviors . .
. . . . .
. . . . .
. . . . .
4 9 10 10 13
... ...
15 15
...
17
...
20
...
22
...
22
...
23
... ... ...
25 27 27
. . . .
28 30 31 33
. . . .
. . . .
3
0882-Perruquetti-ch01_R2_280705
4
Bifurcation and Chaos in Discrete Models
1.10 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1
34 35
Introduction
Dynamics is a concise term referring to the study of time-evolving processes. The corresponding system of equations describing this evolution is called a dynamic system. Nonlinear dynamics is the scientific field concerning the behavior of real systems, linearity being always an approximation. This field, which embraces ordinary differential equations (continuous dynamics) and maps, also called recurrences (discrete dynamics), is too wide to be completely presented in the limited framework of this book. This chapter is limited to an introductory and preparatory knowledge to tackle more complete readings. Two different approaches have been developed for studying nonlinear dynamics. The first corresponds to qualitative methods [9–11]. The “strategy” of these methods can be defined noting that the solutions of equations of nonlinear dynamic systems are in general nonclassical, nontabulated, transcendental functions of mathematical analysis, which are very complex. This strategy is of the same type as the one used for the characterization of a complex variable function by its singularities: zeros, poles, essential singularities. Here, the complex transcendental functions are defined by the singularities of continuous (resp. discrete) dynamical systems such as: Stationary states which are equilibrium points (resp. fixed points), or periodic solutions, that is, limit cycles in the continuous case (resp. cycles in discrete case); which can be stable or unstable Trajectories (resp. invariant curves), passing through saddle singularities of two dimensional systems Stable and unstable manifold for a dimension greater than two Boundary, or separatrix, of the domain of attraction (or basin) of a stable (attractive) stationary state Homoclinic or heteroclinic singularities (defined subsequently) More complex singularities of fractal, or nonfractal type The qualitative methods consider the nature of these singularities in the phase space (state space) and their evolutions in the presence of varying system parameters or in the presence of a continuous structure modification of this system (study of the bifurcation sets in a parameter space, or in a function space). Roughly speaking, a bifurcation corresponds to a
0882-Perruquetti-ch01_R2_280705
1.1
Introduction
5
qualitative change of a system behavior from a very small modification of its parameters or of its structure. Within the framework of the bifurcation theory for continuous time systems [described by ordinary differential equations (ODEs)], A.A. Andronov and L.S. Pontrjagin introduced, in 1937, the concept of roughness or structural stability (somewhat related to the robustness notion in control engineering). The importance of this concept is essential both in practice and in theory. An ODE (a dynamic system) is said structurally stable if the topological structure of its solutions does not change for small modifications of its parameters or of its structure. To be physically significant, a model of dynamic system must respect the following conditions: 1. A solution should exist 2. This solution should be unique 3. The unique solution should be continuous with respect to the data contained in the initial conditions or in the boundary conditions 4. The dynamic system should be structurally stable The first three conditions were formulated by Hadamard in 1923. The study of the problem of structural stability (or roughness) can be considered complete for the two-dimensional autonomous ODEs. Andronov and Pontrjagin formulated, in 1937, the corresponding basic theorems in the analytic case. They are given in Andronov et al. [11], which also presents an exposition of the notion of degree of structural instability. In 1952, De Baggis presented proofs of these theorems in the more general case of smooth functions. For autonomous two-dimensional ODEs (two-dimensional vector fields), general conditions of structural stability are: 1. The system has only a finite number of equilibrium points and limit cycles, which are not in a critical case in the Liapunov’s sense (all the eigenvalues have real part different from zero). 2. No separatrix joins the same, or two distinct equilibrium saddle points (i.e., one eigenvalue is positive, the other negative). In this case it is possible to define, in the parameter space of the system, a set of cells inside each of which the same qualitative behavior is preserved. The knowledge of such cells is of primary importance for the analysis and the synthesis of dynamic systems in physics or engineering. On the boundary of a cell, the dynamic system is structurally unstable, and for autonomous two-dimensional systems (two-dimensional vector fields),
0882-Perruquetti-ch01_R2_280705
6
Bifurcation and Chaos in Discrete Models
structurally stable systems are dense in the function space. Till 1966, the conjecture of the extension of this result for higher dimensional systems was admitted. But Smale [154] showed that, in general, this conjecture is false. Therefore, it appears that, with an increase of the problem dimension, one also has an increase of complexity of the parameter (or function) space. The boundaries of the cells defined in the phase space (such cells are basins), as well as in the parameter space, in general have a complex structure, which may be fractal (self-similarity properties) for n-dimensional vector fields, n > 2. The Smale sufficient conditions of structural stability were the subject of new research in Russia, in particular with the Shilnikov’s results (see the corresponding references in Shilnikov [148–150]. The second approach of nonlinear dynamics corresponds to the analytical methods. Here, the aforementioned complex transcendental functions are defined to be convergent, or at least asymptotically convergent series expansions, or in “the mean.” The method of Poincaré’s small parameter, the asymptotic methods of Krylov–Bogoliubov–Mitropolski are analytical. So are the averaging methods, and the method of harmonic linearization in the theory of nonlinear oscillations. The two nonlinear dynamics approaches constitute relatively independent branches of the nonlinear oscillations theory. They have the same aims: construction of mathematical tools for the solution of concrete problems; and development of a general theory of dynamic systems. Since 1960, the important development of computers has provided a large extension to the numerical approach. Such an approach constitutes a powerful tool when associated with the qualitative and analytical methods. During the last 30 years, interest in deterministic models generating solutions without any regular character (called chaotic behaviors, since 1975) has been increasing. It is about behaviors sensitive with respect to initial conditions, and very small parameter variations. Such a sensitivity induces a practical unpredictability of the model’s behaviors solutions, due to the “physical” finite precision related to the data of a concrete problem. Most scientific fields dealing with dynamical processes have been plagued by such problems. More recently, it has been observed in the case of electronics, signal processing, and control. Chaotic dynamics is a subset of the interdisciplinary field named “complex dynamics,” a domain of the nonlinear dynamics concerned with the study of systems with nonlinearities inducing strong effects. Indeed, among dynamical behaviors met in the different scientific fields, one can discern those for which nonlinearities generate small effects and those for which they are dominant. In the latter case, the problem of the transition order-chaos under the influence of small parameter variations, or a small structure perturbation, gains particular importance. Generally, this gives rise to characteristic infinite sequences of bifurcations. Such bifurcation sequences are diverse and nonclassical. They result from an increase of nonlinear effects in the sense order toward chaos.
0882-Perruquetti-ch01_R2_280705
1.1
Introduction
7
To avoid an abstract mathematical definition, a motion generated by a purely deterministic system will be chaotic if it does not represent any dynamical regularity and if it is sensitive with respect to very small changes of initial conditions (phase space). Such a behavior is also accompanied by a sensitivity with respect to very small parameter changes (parameter space), or to very small changes of a model structure (function space). For concrete systems, due to the “physical” finite precision of the data related to the phase and the parameter spaces, the corresponding models lose their predictability capacity, which is an essential characteristic of chaotic processes. In contrast to other fields where chaotic behaviors are accepted as a natural effect, generally in engineering they are considered as unfavorable, but in some applications they are used for obtaining special useful functions. In the two cases discussed earlier, a fundamental knowledge of bifurcation mechanisms generating chaos is essential for a good parameter choice at the synthesis step of an engineering project. This choice ensures that the chaos is either absent when it is unwanted or is present with fixed characteristics when it is related to a well-defined operating function. In both cases, it is taken into account the environment modifications. The present chapter, essentially dealing with discrete models, is presented in the framework of the qualitative methods of nonlinear dynamics. Discrete models (recurrences or maps) are of two types with different properties. The first type corresponds to invertible maps T (i.e., the inverse map T −1 exists and is unique). The second type is related to noninvertible maps [i.e., depending on the phase (state) point either the inverse map T −1 is not real or it is not unique]. The latter situation induces new singularities and bifurcations. Note that a map (or a recurrence) model can either directly describe a system with discrete information or be the result of a Poincaré section (see Section 3.2) applied to an ODE. This text also deals with complex dynamics of continuous systems. It is clear that a simple chapter, even in a survey form, cannot present a complete view of the title subject. The purpose of this text is limited to providing basic knowledge of chaotic phenomena with bifurcations generating such behaviors, in a non-abstract elementary form. In this framework, it is rather a guide to more complete information, which can be gathered from the references. This might provide additional theoretical and practical insight for researchers and engineers dealing with dynamical systems in different fields, among them control engineering, signal processing, and nonlinear electronics. Even if the volume of references here is relatively large, it does not pretend to be exhaustive. Complementary lists of references can be found in Gumowski and Mira [68, 69], Guckenheimer and Holmes [64], Abraham and Marsden [2], Mira [108, 111, 112], Sharkovskij et al. [146], Mira et al. [121], [130] Shilnikov et al. [150], Rössler [141], and Ueda [160–162].
0882-Perruquetti-ch01_R2_280705
8
Bifurcation and Chaos in Discrete Models
For basic formation on nonlinear dynamics, Andronov et al. [10], using simple mathematics and useful applications for engineers, must be considered as the Bible. A reader without any knowledge about nonlinear dynamics and without any liking for mathematics can acquire great deal of information about this field, extended to chaotic behaviors, from Abraham and Show [3]. It is a pedagogical book, which uses only geometric figures and relations with concrete mechanical and electronic circuits, to describe the most complex nonlinear behaviors. Readers intrigued by more sophisticated mathematics can consult (among other books) Abraham and Marsden [2], Guckenheimer and Holmes [64], Sharkovskij et al. [146], and Shilnikov et al. [150]. Numerical algorithms for nonlinear dynamics are presented in Kawakami [79], Parker and Chua [135], Carcassès [30–32], Carcassès and Kawakami [33, 34]. A part of the results presented here are due to a group whose research was conducted in Toulouse from 1963 to 1996. The history of this group (now reduced to the author), with an extended presentation of the problems and references, is given pp. 95–197 of Abraham and Ueda [5]. This book is devoted to history of “teams and people who had struggled with chaos concepts before the acceptance of the new paradigm” (cf. the editors’ preface p. v and Abraham [1], Ueda [160–162], Rössler [141], Li and Yorke [90], and Smale [156]). The remainder of the chapter is organized as follows. In Section 1.2, a very simple example (a one-dimensional quadratic recurrence or map) tackles the chaos problem and the related unpredictability thus generated. This is completed by a short description of associated behaviors in the general case. Section 1.3 deals with some generalities on discrete models. They can have different forms (explicit, implicit, parametric, autonomous, nonautonomous, invertible, and noninvertible) corresponding to a large variety of applications. References to some of them are provided. They can also be indirect discrete models associated with an ODE by a Poincaré section, which decreases the original dimension of the problem. Section 1.4 defines the singularities and the bifurcations common to invertible and noninvertible maps. When the map comes from an ODE, the sense of these notions is given in the continuous case. Singularities and bifurcations specific to noninvertible maps are discussed in Section 1.5. Section 1.6 presents two notions specific to noninvertible maps, having a practical interest: that of absorbing domain and of a chaotic domain. A survey on basin properties and their bifurcations is given in Section 1.7. Section 1.8 briefly presents map models having vanishing denominators. Such maps introduce new singularities and new bifurcation types. These results also concern maps T without vanishing denominators, but the inverse, T −1 , has a vanishing denominator, which gives rise to characteristic chaotic attractors. Section 1.9 tackles the difficulty in distinguishing a purely chaotic behavior (deterministic origin) from a noise effect. In the case of coexistence of these two phenomena, the extraction of the chaotic signal presents major difficulties. References to this problem and the characterization (different
0882-Perruquetti-ch01_R2_280705
1.2
Chaos and Unpredictability
9
definitions of the dimension of a strange attractor, Liapunov exponent) of chaotic behaviors are presented.
1.2
Chaos and Unpredictability
As noted in Section 1.1, the unpredictability property of chaotic behaviors is essentially related to a large sensitivity of model solutions with respect to initial conditions. The simplest example illustrating this point is the following discrete model under the form of a recurrence relationship: a noninvertible map called Myrberg’s map [126–129]: xn+1 = xn2 − λ, λ = 2,
x(n = 0) = x0 , n = 1, 2, 3, . . .
(1.1)
In the interval −2 < x < 2, its solution remains bounded and chaotic. It is an exceptional case which can be stated from a classical transcendental function of the mathematical analysis x 0 xn = 2 cos 2n arccos 2 where an appropriate determination of arccos is chosen for each initial condition x0 . Here, the chaos is generated by the ordinates of a periodical function taken at exponentially increasing abscissa. The sensitivity of the solution xn with respect to the initial condition xn can be defined by the coefficient 2 −1/2 x x ∂xn 0 Sn = = −2n+1 1 − 0 sin 2n arccos ∂x0 2 4 Therefore, Sn is a function of n, quickly increasing on the whole due to the term 2n+1 . Two very close initial conditions x0 , x0 of the interval ]−2; 2[ generate two bounded iterated sequences, but |xn − xn | increases quickly when n increases for n < N. When n > N, this difference ceases to increase (because xn is bounded) and varies in a muddled way. The segment −2 ≤ x ≤ 2 is called chaotic segment. It is characterized by the presence of many infinite sequences of unstable cycles (i.e., points such that xn+k = xk , xn+p = xp for p < k) with increasing period k, and their limits when k → ∞. The resulting point set has a fractal organization, that is the set is self similar (the whole is similar to the parts, even if they are infinitesimal). One-dimensional quadratic maps, obtained by a linear change of variable [as the so-called “logistic map” x = λx(1 − x)], have the same properties. The map (1.1) gives a one-dimensional example of
0882-Perruquetti-ch01_R2_280705
10
Bifurcation and Chaos in Discrete Models
an intrinsically deterministic behavior with a chaotic dynamics, related to very large sensitivity with respect to very small variations of the initial state. This behavior clearly appears through such a simple example from the very rare possibility of having an analytical form of the solution, using the classical transcendental functions (see other cases pp. 24–31 of [108] and pp. 33–45 of [121]). More generally, chaos generated by one-dimensional maps are discussed in Li and Yorke [90] and references presented therein. Generally, whatever be the model’s nature, or the process (continuous or discrete) or its dimension, the solution is a nonclassical, nontabulated function of mathematical analysis. However, the existence of infinitely many sequences of unstable periodic stationary states is one of the characteristic features of chaotic behaviors with a deterministic origin. Such a chaotic behavior can be either stable (strange attractor ) or unstable (strange repeller). A strange repeller leads either to a chaotic transient toward a nonchaotic stable stationary state or to fractal basin boundaries (fuzzy boundaries) separating the influence domain of m asymptotically stable stationary states. An initialization in a region of fuzzy basin boundary leads to uncertainty about the convergence of the model state toward one of the m stable stationary states, after a chaotic transient which persists as long as the state does not leave the fuzzy boundary region. The case of the chaotic transient toward only one stable stationary state is unexpected in the sense that a short term forecast is very difficult, but not a long-term one as the transient ends in a regular convergence toward this stable stationary state. From a practical point of view, a stable periodic motion, having a period larger than the possible duration of observations with an irregular evolution during this period, can be also considered to be chaotic. In such a case (the simulation one) the term “chaos in a nonstrict sense,” or nonstrict chaos will be used with respect to the strict chaos, for which it is mathematically possible to prove the existence of chaos. When an erratic dynamical behavior is experimentally observed, the following fundamental question arises: is it origin deterministic, or coming from a purely random source, or mixed?
1.3 1.3.1
Generalities on Discrete Models Different Forms of Models
This section concerns dynamical systems, described directly or indirectly (link with ODEs defined below) by a “ discrete ” equation, whose solution is a sequence of points determined by an initial point (initial condition). The model of many processes are of such a type called recurrence relationship
0882-Perruquetti-ch01_R2_280705
1.3
Generalities on Discrete Models
11
(or simply recurrence). The explicit form is written as: Xn+1 = F(Xn , )
X(n = 0) = X0
(1.2)
where X is a phase (or state) vector, is a parameter vector, and X0 is the initial condition. Depending on the scientific field, such an equation is also called iteration, or map, or point-mapping. Sometimes it is wrongly called difference equation because the solution of X(t) is no longer a point sequence and is defined by an initial function X(t) = X0 (t) for −1 ≤ t < 0 (cf. Sharkovskij et al. [146]). In this chapter, relationship (1.2) will be called a map, denoted T. Its equation is symbolically represented by: Xn+1 = TXn
or without lower indices X = TX
(1.3)
The point X (or Xn+1 ) is called the rank-one image (or rank-one consequent) of X (or Xn ). It is worth noting that the single-valuedness (X exists and is unique) of the function F(Xn , ), defining the map T, does not imply anything about the existence and uniqueness of its inverse X = T −1 X . Indeed, this inverse may not exist, or it may be multivalued, then the map is called noninvertible. The map is invertible if its inverse exists and is unique. Considering the inverse map, X = T −1 X belongs to the set of rank-one preimages (or rank-one antecedent) of X , which may be made up of several points, or only one point, or even void. The map Xn+r = Fr (Xn , ) deduced from relationship (1.2) after r iterations is denoted T r , Xn+r = T r Xn , where Xn+r is the rank-r image (or rank-r consequent) of Xn . A point Xn belongs to the set of rank-r preimages (or rank-r antecedents) of Xn+r . The discrete time n does not appear explicitly in Equation (1.2) and Equation (1.3), so they are called autonomous. The equation is called nonautonomous if n appears explicitly: Xn+1 = F(Xn , n, ),
X(n = 0) = X0 ,
X = Tn X
The one-dimensional example: x = x2 − λ (Myrberg’s map), where λ is a parameter, illustrates √ a case of noninvertible maps and the inverse map T −1 is given by x = ± x + λ. The rank-one preimage of a point x is double-valued for x > −λ, and is not real for x < −λ . The point x = −λ is called critical point (in the Julia–Fatou sense). In many publications, the extremum x = 0, point of two coincident rank-one preimages, is also called critical, which will not be the case in this chapter. When the inverse map T −1 is multivalued, or may not exist, the map T is called noninvertible or endomorphic. When T −1 exists and is unique, the map T is said invertible, and if the map is smooth, T is called a diffeomorphism. More generally, a discrete model of a process in engineering does not have the aforementioned, simple explicit form. It presents itself either in
0882-Perruquetti-ch01_R2_280705
12
Bifurcation and Chaos in Discrete Models
an implicit form or in a parametric form, frequently of a noninvertible type. The first case corresponds to the following relation: F(Xn+1 , Xn , ) = 0
(1.4)
The parametric case may give rise to different formulations: F(Xn , ) = G(Vn , ),
G(Xn+1 , ) = F(Vn , ),
dim X = dim V
(1.5)
(Xn , Xn+1 , Vn , ) = 0,
dim X = m,
dim V = s,
dim = m + s Xn+1 = F(Xn , Vn , ),
(1.6) G(Xn , Vn , ) = 0, with dim X = m,
dim V = dim G = s, m ≥ s i (Xn , Xn+1 , Vn , ) = 0, dim V = s,
(1.7)
dim X = m,
i = 1, 2, . . . , s + 1
(1.8)
In Equation (1.5) to Equation (1.7), V is the “auxiliary parameter” of the parametric form, which has a different nature with respect to that of the “natural parameter” . When they are numerically treated, these map equations do not give rise to more difficulties than the explicit form. In (1.7), V is frequently a discrete time (for m = 1, it is generally a commutation time) defined by G(Xn , Vn , ) = 0. The choice of one solution belonging to V defined by G(Xn , Vn , ) = 0 (if it is not unique) is assured from “physical” conditions associated with this relation. It is the same for the choice of Xn+1 in (1.4)–(1.6) and (1.8). The solution of (1.2) to (1.8), for the initial condition X(n = 0) = X0 , is a sequence of points: Xn = X(n, X0 , ),
n = 1, 2, 3, . . .
(1.9)
which is called iterated sequence, or discrete phase trajectory, or orbit. The map T can be considered to be an implicit definition of the function X(n, X0 , ). Though theoretically quite satisfactory, such a definition is practically almost useless, because generally the function X is unknown, except for the linear case and for very few examples in the nonlinear case. In all noncontrived cases, it cannot be expressed explicitly in terms of the known elementary and transcendental functions. Many classes of discrete dynamical systems give rise to models in the form of invertible or noninvertible maps in engineering, physics, computing and numerical simulation, dynamics of population, economics, biology, etc.
0882-Perruquetti-ch01_R2_280705
1.3
Generalities on Discrete Models
13
In control engineering, it is particularly the case of: Systems using sampled data [35, 113], or switching elements [56], or pulse modulation (width modulation, frequency modulation) (cf. [68] and pp. 348–356, 366–370 of [109]) Adaptive control [6, 7, 48, 49, 85, 86] Neural networks [39, 137, 139] In nonlinear electronics, it is about rectifier using thyristors with voltage feedback, or current feedback [56], pp. 447–460 of [68], and pp. 370–387 of [109], oscillations [91–93], and Chua’s circuit (Chua [40]). Signal processing is concerned with bifurcations in the DPCM transmission system with an order two predictor [47, 55], sigma–delta modulation (described by piecewise continuous maps) [45], digital filters [133], and chaos synchronization [71, 134, 136, 151] for secure communications [99]. Frequently, in the aforementioned engineering fields, the function G(Xn , Vn , ) = 0 is the time interval separating the indices n and n + 1 [56] and pp. 366–387 of [109]. The function G(Xn , Vn , ) = 0 can also be an integral, one of whose bounds is Vn (case of the IPFM, integral pulse frequency modulation). In physics, “indirect” discrete models are for problems of turbulence, radiophysics, etc., via reduction of boundary value problems to difference equation [93, 145–147]. Economics and biology often lead to non-invertible maps [14, 52, 62]. A discrete equation of the earlier type corresponds to a direct model of a dynamic system or constitutes an indirect description of a continuous process. By direct model it is supposed that Equation (1.3) or Equation (1.2) is that of a dynamic system, which by its own nature is of discrete type, that is, the available information about its evolution is only accessible in a sampled form (discrete time). By indirect description it is assumed that the discrete equation is associated with an ODE, with the aim of obtaining an easier study of the original equation. This approach presents two different aspects. The first one concerns the discretization methods of ODEs, leading in particular to numerical simulations of continuous processes. In this case, depending on the method, the dimension of (1.3) is either equal to that of the ODE or higher. With the second aspect, the map is the result of application of the classical Poincaré’s method of section surface to an ODE whose “real” dimension is m, this with the aim of a decrease of the initial real dimension. Then the map dimension is m − 2 if the ODE is conservative, and m − 1 if it is not.
1.3.2
Maps Obtained from an ODE by a Poincaré Section
Such maps correspond to an indirect description of a model in an ODE form after applying the Poincaré’s section method. For the sake of simplicity, we
0882-Perruquetti-ch01_R2_280705
14
Bifurcation and Chaos in Discrete Models
limit to a “real” ODE dimension equal to three. Therefore, this method can be understood by considering the following dynamical systems (where t is the time): dui = fi (u1 , u2 , u3 ), i = 1, 2, 3 dt dui = gi (u1 , u2 , ωt), i = 1, 2 dt
(1.10) (1.11)
with fi and gi being smooth functions of their (real) arguments and gi being periodic in t with the period τ = 2π/ω. Equation (1.10) is a three-dimensional autonomous ODE and (1.11) is a two-dimensional nonautonomous ODE. Nevertheless, they can be considered as having the same real dimension m = 3 because, by adding into (1.11) a third relation du3 /dt = ω, an equivalent form of (1.10) is obtained. Let U be the phase vector: [u1 , u2 , u3 ] of (1.10), and the phase vector [u1 , u2 ] for (1.11). Considering an initial condition U = U0 for t = t0 , the phase (or state) trajectory is the curve of the phase (or state) space defined by the solution U = U(t, U0 ) of the earlier two ODEs. With (1.10) considering the three-dimensional space (u1 , u2 , u3 ), a “regular” surface S transverse intersects the whole set of phase trajectories and a point Mn (t = tn ) intersects U = U(t, U0 ) with S. Let (xn , yn ) be the Mn coordinates defined from the reference axes related to S. Let N be oriented normal to S. For increasing values of time t, let Mn+1 (t = tn+1 ) be the following intersection of U = U(t, U0 ) taking place in the same sense as the U evolution from Mn [i.e., the scalar products NU(tn , U0 ) and NU(tn+1 , U0 ) have the same sign]. Then, the points Mn and Mn+1 are related by an autonomous two-dimensional map Mn+1 = T Mn ,
n = 0, 1, 2, . . .
obtained from the solution (generally a numerical one) in the interval (tn , tn+1 ). For the ODE (1.11), the same form of map is defined considering the points M at times tn = nτ and tn+1 = (n + 1)τ : Mn [xn = u1 (nτ ), yn = u2 (nτ )] and Mn+1 {xn = u1 [(n + 1)τ ], yn = u2 [(n + 1)τ ]}
(1.12)
In the two cases, the study of ODE with a real dimension of three can be made from the associated two-dimensional autonomous map Mn+1 = T Mn . This result is extended to all ODEs, whatever be their dimension. This leads to a decrease of one unit from the original real dimension of the ODE, which facilitates its study [72, 73, 79, 84]. Practically, in the
0882-Perruquetti-ch01_R2_280705
1.4
Singularities and Bifurcations
15
general case, the solution U = U(t, U0 ) is not analytically known. Nevertheless, this is not a difficulty because between the times tn and tn+1 the ODE can be solved numerically using a computer, which numerically defines the map T on which all the operations of the following sections can be programmed. When the ODE data are smooth the map T is always invertible.
1.4 1.4.1
Singularities and Bifurcations Common to Invertible and Noninvertible Maps Singularities and Bifurcations
Let T be a p-dimensional map (1.2) or (1.3) depending on the parameter vector . Let X0 be an initial condition. Qualitative methods of nonlinear dynamics are used to characterize the nonclassical transcendental function X(n, X0 , ) of (1.9). A meaningful characterization consists of the identification of its singularities and the behavior of these singularities as the parameter varies. Any change in the nature of singularities so-obtained, or any change of their qualitative properties, is called a bifurcation. In the parameter space, the boundary-separating behaviors of Xn , which are qualitatively different, are called a set of bifurcation values of the system parameters, for which the system is structurally unstable. The simplest singularities are zero-dimensional: period (or order) k-cycles, denoted also k-cycles. A k-cycles is a set of k consecutive points Xi∗ , i = 1, 2, . . . , k, permuting by successive applications of T, such that Xi∗ = T k Xi∗ , with Xi∗ = T r Xi∗ for 1 ≤ r < k. When k = 1 the point X ∗ is called a fixed point (period-one cycle). In the rest of the chapter, when “cycle” is used, this may implicitly concern a fixed point. A cycle may be attracting (stable), or repulsive (unstable). Let T be a smooth map. Then, it is possible to define the Jacobian matrix at a fixed point X ∗ , and considering T k the Jacobian matrix at a period k-cycle point Xi∗ . The p eigenvalues Sj , j = 1, . . . , p, of such a matrix are called the fixed points, or the cycle, multipliers. A cycle is stable, if and only if, all the multipliers are such that Sj < 1. It is unstable when at least one of the multipliers is |Sl | > 1. When at least one of the multipliers is |Sl | = 1 for a parameter value = b , it corresponds to a critical case in the Liapunov’ sense. Crossing through this case by a variation gives rise to a local bifurcation. An unstable cycle with |Sr | > 1, |Ss | < 1, dim r + dim s = p, is called a saddle. The dimension s and the sign of each multiplier define different types of saddle. A fixed point, or a cycle, such that all the multipliers are as Sj > 1, j = 1, . . . , p, is said to be expanding.
0882-Perruquetti-ch01_R2_280705
16
Bifurcation and Chaos in Discrete Models
When dim X = p = 2, X = (x, y), according to their multiplier values, cycles are classified into: Stable (resp. unstable) node if the multipliers are real with |S1 | < 1 and |S2 | < 1 (resp. |S1 | > 1 and |S2 | > 1). A node is of type one if S1 > 0 and S2 > 0, of type two if S1 and S2 have opposite signs, and of type three if S1 < 0 and S2 < 0 Focus if the multipliers are not real Saddle if |S1 | < 1 and |S2 | > 1. A saddle is of type one if S1 > 0 and S2 > 0, of type two if S1 and S2 have opposite signs, and of type three if S1 < 0 and S2 < 0 A period k-cycle is identified by the symbolism (k; j), j being an index characterizing the permutation of the k-cycle points by k successive applications of T. This index permits the differentiation of cycles having the same period k and issued from different bifurcations (two cycles coming from the same bifurcation have the same permutation points). Invariant curves G(x, y) = c, c being a constant, by T (resp. T k ), passing through a fixed point (resp. period k-cycle) are manifolds, solutions of the functional equation G(xn , yn ) = G(xn+1 , yn+1 ) [resp. G(xn , yn ) = G(xn+k , yn+k )]. The complexity of this classification increases with the map dimension. Manifolds (or sets) of dimension d = 1, 2, . . . , p − 1 (dim X = p), invariant or mapped onto itself, by T or T −1 (resp. T k or T −k ), and passing through a cycle point, constitute singularities of higher complexity with respect to fixed points and cycles. Locally, they are defined from the eigenvectors associated with the cycle multipliers (if they are real). For a saddle cycle X ∗ , the manifold (or set) associated with |Ss | < 1 is called the stable manifold (or set) W s (X ∗ ) of this cycle. The manifold (or set) associated with |Sr | > 1 is called the unstable manifold (or set) W u (X ∗ ) of the saddle cycle. Eigenvectors of a fixed point permit to define the local tangent manifold of such a point. Nonfractal singularities of dimension p − 1, invariant by T −1 , or T −k bounding open regions of the p-dimensional phase (or state) space, inside each of them the qualitative behavior is well defined, play a fundamental role. These regions correspond to initial conditions giving rise to a transient toward a stable steady state. Generally, each of them constitutes the influence domain (called basin) D(A) of a well-defined attracting set A. A closed and invariant set A is called an attracting set if some neighborhood U of A exists such that T(U) ⊂ U, and T n (X) → A as n → ∞, ∀X ∈ U. Generally, the basin boundary ∂D(A) contains at least a saddle with |Ss | < 1, s = 1, 2, . . . , p − 1, and its stable manifold W s . When the map T is invertible, a basin is always simply connected. This is not always the case when T is noninvertible, the basin being either simply connected, or multiply connected, or nonconnected.
0882-Perruquetti-ch01_R2_280705
1.4
Singularities and Bifurcations
17
A map may also generate singularities with a noninteger dimension. These singularities constitute what is called “fractal sets,” which can be attracting (strange attractor) or repulsive (strange repeller) for the points located in a sufficiently small neighborhood of such a set. Whatever be the map [invertible (with p ≥ 2) or noninvertible (with p ≥ 1)], a basin boundary ∂D(A) can also be fractal (i.e., it can have a noninteger dimension). In this case, ∂D(A) contains a strange repeller. The set ∂D(A) is sometimes called chaotic basin boundary. If a map is noninvertible, a multiply connected or nonconnected basin generally implies a fractal basin boundary. The set W s (X ∗ ) ∩ W u (X ∗ ) is called homoclinic if it is made up of an infinite number of intersections. Let X ∗ and Y ∗ be two fixed points (or cycles), then the set W s (X ∗ ) ∩ W u (Y ∗ ) is said heteroclinic. Homoclinic and heteroclinic situations are signs of (stable or unstable) chaotic behaviors. Bifurcations by homoclinic or heteroclinic tangency (limit of existence of infinite intersections) are global bifurcations which may correspond to bifurcations of an ordered dynamics toward a chaotic one. Consider a m-dimensional dissipative system which, in the discrete case, is a diffeomorphism. An “ordinary” attractor A is a subset of the phase space so that in a sufficiently small neighborhood of A, an initial volume contracts and converges asymptotically toward A. In a chaotic situation, this contraction does not occur in all the directions. Indeed there is also a stretching toward certain directions, this leading to a complex folding of the initial volume, and giving rise to a foliated structure with infinitely many sheets, when the (continuous or discrete) time tends toward infinity. At the limits, a section in the direction of contraction locally gives a Cantor set. Then the final figure is fractal, and corresponds to a strange attractor with a noninteger dimension. In the two-dimensional case, this complex folding is related to the Smale horseshoe [152–156]. Such a process is also described in pp. 317–322 of [108] with application to the invertible quadratic map (diffeomorphism) x = 1 − ax2 + y, y = bx.
1.4.2
Bifurcation Sets: Normal Forms of Exceptional Critical Cases
Consider the situation dim X = p = 2, X = [x, y]t , and a parameter plane (λ1 , λ2 ). As mentioned earlier, the multipliers S1 and S2 of a (k; j)-cycle are the eigenvalues of the linearization of T k in one of the k points of this cycle. j In a parameter plane, a fold bifurcation curve (k) is such that only one 0 of the multipliers associated with a (k; j) cycle is S1 = +1. In the simplest case, this curve corresponds to the merging of a (k, j) saddle cycle (S1 < 1, S2 > 1) with a stable (or unstable) (k, j) node cycle (0 < S1 < 1, 0 < S2 < 1). j Similarly a flip curve k is such that one of the two multipliers is S1 = −1, which gives rise to the classical period doubling from the (k; j) cycle. In
0882-Perruquetti-ch01_R2_280705
18
Bifurcation and Chaos in Discrete Models
the simplest case, this curve corresponds to a stable (k, j) node cycle (−1 < S1 < 0, S2 < 1) which turns into a (k, j) saddle k-cycle (S1 < −1, 0 < S2 < 1), giving rise to a stable (2k, j )-node cycle (0 < S1 < 1, 0 < S2 < 1). Changing stable into unstable also results in a flip bifurcation. j
As for a fold curve, a Pitchfork bifurcation curve (k) corresponds to a (k; j)0 cycle with one of the multipliers S1 = +1, but it is associated with three merging (k; j)-cycles. For example, a stable (k; j)-node cycle (0 < S1 < 1, 0 < S2 < 1) gives rise to a (k; j)-saddle cycle (S1 < 1, S2 > 1) with two stable (k; j)-node cycles (0 < S1 < 1, 0 < S2 < 1), with all these cycles merging for a parameter point on the pitchfork curve. The case Si (X, b ) = e±jϕ , i = 1 or 2, j2 = −1, corresponds to a Neimark bifurcation (frequently and erroneously attributed to Hopf ). In the simplest case, for example, when crosses through b a stable (resp. unstable) focus point becomes unstable (resp. stable) and gives rise to a stable (resp. unstable) invariant closed curve (γ ). The corresponding bifurcation curve j ( k ) in the parameter plane is called a Neimark curve. Fold, flip, pitchfork, and Neimark bifurcation curves are given in a parametric form [the vector X being the parameter of the parametric form, Si (X, ) being one of the two multipliers of the cycle (k, j) considered here] by the following relations: X = T k (X, ),
X = T k (X, ),
for r < k, dim X = 2
Si (X, ) = +1, i = 1 or 2, for fold and pitchfork curves Si (X, ) = −1, i = 1 or 2, for flip curves Si (X, ) = e±jϕ , i = 1 or 2, j2 = −1, for Neimark curves The Neimark bifurcation may gives rise to several situations when ϕ is commensurable with 2π . The simplest one corresponds to the closed curve (γ ) made up of an unstable (resp. stable) manifold of a period k saddle associated with a stable (resp. unstable) period k node (or a period k focus). More complex cases, depending on the nonlinear terms, occur when certain values of ϕ, commensurable with 2π , ϕ = 2pπ/q, are related to exceptional critical cases requiring special normal forms for their study [12] (Holmes and Williams [75], pp. 215–239 of Mira [108], and Mira [101–103]). When the map is associated with an ODE, such cases may be related to complex resonance situations [118, 138]. More complex critical situations and their related bifurcations are described in pp. 239–255 of [108]. The aforementioned bifurcation curves correspond to codimension-1 bifurcations. Such curves may in turn contain singular points, the simplest ones being of codimension-2 (e.g., the fold cusp lying on a fold curve as meeting point of two fold arcs in a cusp form).
0882-Perruquetti-ch01_R2_280705
1.4
Singularities and Bifurcations
19
A set of bifurcation curves in a parameter plane (λ1 , λ2 ) is not sufficient to account for the complete bifurcation properties. Indeed, it does not permit to identify the merging cycles. This is why the parameter plane must be considered to be made up of sheets. Each sheet is associated with a given cycle (k; j) in a three-dimensional auxiliary qualitative space having a foliated structure. The third dimension is an adequate “qualitative” norm related to the (k, j) cycle. The identification of the sheet’s “geometry” consists of determining how it can be passed continuously from one sheet to another, following a continuous path of the parameter plane (i.e., to knowing the possible communications between sheets) (Mira et al. [114, 115, 117], Mira and Djellit [117], and Allam and Mira [8]). In the simplest case, a fold bifurcation curve is the junction of two sheets: one related to a saddle (k; j) cycle, the other to a (k; j) cycle having the modulus of each of the two multipliers less than 1 (stable node or stable focus) or having the modulus of its two multipliers greater than 1 (unstable node or unstable focus). A flip bifurcation curve is the junction of three sheets: one associated with a (k; j) cycle having the modulus of its two multipliers less (resp. greater) than 1, the second sheet corresponding to a saddle (k; j) cycle having one of its two multipliers less than −1, the third being related to a (2k; j ) cycle having the modulus of its two multipliers less (resp. greater) than 1. A pitchfork curve is the junction of four sheets: three related to a stable (k; j) node cycle (0 < S1 < 1, 0 < S2 < 1) and one related to a (k; j) saddle cycle (S1 < 1, S2 > 1). The sheets of the auxiliary three-dimensional space present folds along fold curves, and have junctions with branching along flip, or pitchfork, curves. The association of several bifurcation curves with their corresponding sheets and communications through codimension s ≥ 2 singularities constitute a bifurcation structure. Codimension-2 points correspond to complex communications between the sheets. Therefore, the association of fold and flip curves in the neighborhood of a fold cusp leads to the definition of three fundamental communication types: the crossroad area (CRA), the saddle area (SAA), and the spring area (SPA) [108, 114]. Other types of singularities, with the corresponding three-dimensional representation of the sheets, are described in Carcassès et al. [29], Mira et al. [115, 119], Mira [110], Allam and Mira [8], and Mira and Qriouet [118]. However a representation of sheets of the parameter plane may lead to some difficulties due to the fact that generally the foliation is defined without ambiguities in a four-dimensional space. Thus, one may have situations such that it is possible to project the four-dimensional space into one of the threedimensional spaces (x, λ1 , λ2 ) or, (y, λ1 , λ2 ), and sometimes situations may exist for which this is impossible. In the latter case, three-dimensional projections may give rise to sheet intersections in the three-dimensional space which do not correspond to bifurcations.
0882-Perruquetti-ch01_R2_280705
20
Bifurcation and Chaos in Discrete Models
The association of two of the aforementioned communication types leads to particular structures, or patterns, called lip, quasi-lip, dovetail, and islands j [116, 117, 119, 123]. A lip m Lk results from the association of two fold segj
j
j
ments, (k) and (k) , of period k joining at two fold cusp points Ck and 0
j
0
Ck . These points with the related flip curves form a double crossroad area, or a double saddle area, or a double spring area, or an association between crossroad area–spring area. Generally, the parameter vector has a dimension higher than two. Therefore, varying the parameters different from (λ1 , λ2 ), the bifurcations organization in the parameter plane (λ1 , λ2 ) undergoes qualitative changes. This means that transitions of an aforementioned structure into another are possible. So it was shown that a “crossroad area ↔ spring area transition” may occur according to different mechanisms, identified from qualitative changes of a parameter plane (λ1 , λ2 ), and the associated three-dimensional foliated representation (Carcassès et al. [29], Mira and Carcassès [114], Mira [110], Allam and Mira [8], Mira and Qriouet [118], Mira et al. [119]). Useful algorithms permitting the determination of the nature of communication areas and their qualitative changes when a third parameter λ3 varies, as well as the determination of different configurations of bifurcation curves and their foliated representation, are given in Carcassès [30–32] and Carcassès and Kawakami [33, 34], whatever be the map dimension. An algorithm for the determination of bifurcations by homoclinic or heteroclinic tangency can be found in Kawakami [78], Kawakami and Matsuo [81], and Yoshinaga et al. [165].
1.4.3
Singularities Sense when the Map is Obtained from a Poincaré Section
Consider a map T associated with an ODE such as (1.10) or (1.11), or with a real dimension larger than three, then: A fixed point of T corresponds to either an equilibrium point of the ODE, or to a fundamental periodic solution, with a period τ for (1.11). A period k-cycle of T corresponds to a subharmonic oscillation or to fractional harmonic (also called ultra-subharmonic) one, which is a periodic solution having a k-multiple period with respect to the earlier fundamental solution (see later for the definition of these two types of oscillations). In the case of (1.11) the period of the solution is kτ . A chaotic behavior of T corresponds to a chaotic behavior of the ODE solution [65, 73, 79, 159].
0882-Perruquetti-ch01_R2_280705
1.4
Singularities and Bifurcations
21
With ODE submitted to a periodic excitation (of external or parametric type), two cases must be considered. In the first one, the solution tends toward an equilibrium point in the absence of this excitation. Then, when the solution amplitude has a maximum, it is said that a resonance occurs. The second case corresponds to the presence of a stable periodic solution in the absence of periodic excitation. If this excitation exists, and if the ODE solution is periodic, we say that synchronization occurs. Subharmonic or fractional harmonic (ultra-subharmonic) oscillations can be either of resonance type or of synchronization type. It is worth noting that the knowledge of the period k of a cycle, of the index j (characterizing the permutation of its points by successive applications of T), and of its multipliers, does not provide complete information on the ODE periodic solution. It is necessary to associate with this information the knowledge of the solution during the period τ [i.e., the knowledge of the above (γ ) closed curve]. Consider now a period τ solution of a fundamental solution, its Fourier series expansion, and the corresponding frequency power spectrum. Let r be the place occupied by a rank-m harmonic from an ordering based on the harmonics amplitudes in descending order. It is said that a rank-m resonance occurs when the amplitude of the rank-m harmonic occupies the place r = 1 in this ordering. Higher harmonic oscillation of rank-m [82, 83, 117] either of resonance type or of synchronization type, occurs when the place r of the rank-m harmonic is located at a position r < m, sufficiently far from m. Along a path of the parameter plane, the amplitude of harmonic lines (of the power frequency spectrum generated by the periodic solution), as well as their places r, varies continuously. It is possible to define curve arcs for which two harmonics of different ranks have the same amplitude with the place r = 2. The association of such arcs bounds regions of the parameter plane denoted domains of (simple) predominance of a rank-m harmonic. Inside each of these domains, such a harmonic has the place r = 2 in the ordering based on the amplitudes in descending order. When a point of the parameter space gives rise to a rank-m harmonic with the place r = 1, then it is said that this point belongs to a domain of full predominance of the rank-m harmonic [87, 88]. This situation corresponds to a higher harmonic resonance. A point of a domain of predominance, or full predominance, gives rise, in the continuous phase plane [x(t), y(t)], to a closed curve (γ ), passing through the fixed point associated with the period τ solution. The higher the rank-m the more complex is the shape (γ ). Generally, the complexity is defined by (γ ) self-intersecting loops: the more m increases the more the loop number increases. Such closed curves are given in Kawakami [79], Mira and Djellit [117], and Mira et al. [123]. A periodic solution of period kτ with r = 1 is called a 1/k-subharmonic [82, 83, 117]. A higher harmonic oscillation of rank-m [82, 83, 117] related to a period 1/k-subharmonic is called m/k-fractional harmonic. A fractional harmonic (or ultra-subharmonic) solution m/k is such that the dominant
0882-Perruquetti-ch01_R2_280705
22
Bifurcation and Chaos in Discrete Models
frequency contained in X(t) is mω/k, ω being the angular frequency of the aforementioned fundamental solution. This solution corresponds to a period k-cycle of T, but in the continuous phase plane [x(t), y(t)] it gives rise to a closed curve (γ ) passing through the k points of the cycle: the higher the m the more complex is the shape (γ ). Such closed curves are discussed in Kawakami [79], Mira and Djellit [117], and Mira et al. [123]. Fractional harmonics are distinguished as nonreducible fractional harmonics (the ratio m/k cannot be reduced) and reducible ones. In the case of reducible harmonics, the ratio m/k can be reduced, but due to its relation with a k-cycle, it keeps this form to correctly identify its relation with a period k-cycle. Reducible harmonics have a more complex behavior, giving rise to specific bifurcation structures in a parameter plane [138, 158]. In the parameter plane, rank-m resonances, or synchronizations, m = 1, 2, 3, . . . , are related to the existence of an isoordinal cascade either of fold j cusps or lips denoted m Lk , m = 1, 2, 3, 4, . . . “Isoordinal” means that each j
lip is made up of fold arcs corresponding to the same period k, m (k) and
m j (k)0
j
j
0
j
joining at two cusp points m Ck and m Ck . Each fold cusp, or lip m Lk , lies inside a rank-m domain of simple predominance. Such a cascade has a limit set corresponding to a rank-m = ∞ of the higher harmonic resonance [88, 117].
1.5 1.5.1
Map Singularities and Bifurcations Specific to Noninvertible Maps Singularities and Bifurcations Induced by Noninvertible Maps
With respect to invertible maps, noninvertible maps T introduce a singularity of a different nature: the critical set. The rank-one critical set CM is the geometrical locus of points X having at least two coincident rank-one preimages. Such preimages are located on a set CM−1 , the set of merging (or coincident) of rank-one preimages. The set CM satisfies the relations T −1 (CM) ⊇ CM−1 and T(CM−1 ) = CM. A rank-q critical set CMq−1 is given by the rank-q image CMq−1 = T q (CM), CM0 ≡ CM. If dim X = p = 1, CM is a rank-one critical point C. If dim X = p = 2, CM is a rank-one critical curve LC. Such new singularities play a fundamental role in the attractors and basins structure and in their bifurcations. It is the case of “contact bifurcations,” resulting from the meeting of two singularities of different nature: an invariant manifold (or set) by T or T −1 with a critical set. This situation generally gives rise to global bifurcations, which may be related to homoclinic and heteroclinic bifurcations [51, 53, 98, 121]. Most of the results
0882-Perruquetti-ch01_R2_280705
1.5
Map Singularities and Bifurcations Specific to Noninvertible Maps
23
obtained till now concern the general class of maps of the plane T: R2 → R2 . For such maps, the critical set CM generally becomes a critical curve LC. In exceptional cases the critical curve may include isolated points. This is the case when the inverse map T −1 has a vanishing denominator [16–26] (see also Section 1.8). The singularity critical curve constitutes the fundamental tool for the study of two-dimensional noninvertible maps. In general, LC is made up of several branches separating the plane into regions whose points have different numbers of rank-one preimages (or antecedents). Therefore, the plane R2 can be subdivided into open regions Zi (R2 = ∪i Zi , Zi being the closure of Zi ), each point of Zi having i distinct rank-one preimages. There is a class of maps such that a region Z0 exists. The boundaries of the regions Zi are branches of the rank-one critical curve LC, locus of points such that at least two determinations of the inverse map are merging. The locus of these “coincident first rank preimages” is a curve LC−1 , called rank-one curve of merging preimages. As in any neighborhood of a point of LC, there are points for which at least two distinct inverses are defined; LC−1 is a set of points for which the Jacobian determinant of a smooth map T vanishes. If the map is nonsmooth, LC−1 belongs to the set for which the noninvertible map T is not smooth. The curve LC satisfies the relations T −1 (LC) ⊇ LC−1 and T(LC−1 ) = LC. The simplest case is that of maps in which LC (made up of only one branch) separates the plane into two open regions Z0 and Z2 . A point X belonging to Z2 has two distinct preimages (or antecedents) of rank-one, and a point X of Z0 has no real preimage. The corresponding maps are said to be of (Z0 − Z2 ) type. In more complex cases a classification of noninvertible maps from the structure of the set of Zi regions can be made [121, 122]. It is worth noting that the bifurcations organization, for example in a parameter plane, may be very different from that given by invertible maps. Indeed with respect to the invertible case, the noninvertiblity also adds new bifurcation structures in a parameter plane due to the presence of new co-dimension 2 points related to cycles with real multipliers S1 = +1 and S2 = −1 [38].
1.5.2
Fractal Bifurcations Structure of “Embedded Boxes” Type and Chaotic Behaviors
As discussed earlier, chaotic dynamics can be met in a discrete model having the lowest dimension p (i.e., p = 1). The necessary condition of such a behavior is that the corresponding map be noninvertible. Chaotic solutions appear with an invertible map only if the map dimension is at least equal to two. So at equal dimension, noninvertible maps present intrinsically better conditions favoring the birth of chaos [142, 144]. As shown
0882-Perruquetti-ch01_R2_280705
24
Bifurcation and Chaos in Discrete Models
in Section 2, for one-dimensional quadratic maps, the chaotic behavior in an interval is due to the presence of infinitely many infinite sequences of unstable cycles with increasing period k, and their limit set (of “class 1”) being when k → ∞. The infinite set of points of class 1 in its turn has infinitely many limit sets of class 2. Equivalently, limit sets of class q → ∞ are defined [108]. This leads to a fractal organization of the whole set of repulsive singularities; that is, the set is self similar (the whole is similar to the parts even if they are infinitesimal). The Myrberg’s map (1.1) x = x2 − λ illustrates the bifurcation sequences leading to such a situation. The “classical” singularities of the solution of the one-dimensional quadratic map (1.1) are constituted by two fixed points (real if λ ≥ −1/4) verifying x = Tx, the cycles points of period (or order) k, k = 2, 3, 4, . . . , and their limit (fractal) sets when k → ∞. The “nonclassical” singularities, which play an essential role in the fractal bifurcation structure, and the global bifurcations generated by this map, are made up of the set of the critical points of rank Cr , r = 1, 2, 3, . . . . With (1.1) Myrberg has been the first to show a series of essential results for the theory of dynamic systems: •
All the bifurcations values of (1.1) occur into the interval −1/4 ≤ λ ≤ 2.
•
The number Nk of all possible cycles having the same period k, and the number Nλ (k) of bifurcation values giving rise to these cycles, increases very rapidly with k. So one has Nk = Nλ (k) = 1, if k = 2; Nk = 2, Nλ (k) = 1, if k = 3; Nk = 3, Nλ (k) = 2, if k = 4; Nk = 6, Nλ (k) = 5, if k = 3; Nk = 99, Nλ (k) = 28, if k = 10; Nk = 35,790,267, Nλ (k) = 7,895,679, if k = 30; Nk → ∞, Nλ (k) → ∞, if k → ∞ (for more details see Mira [108]).
•
The cycles (k; j) with the same period k differ from one another by the cyclic transfer (shift defined by the index j) of one of their points by k successive iterations by T. These cyclic shifts were defined by Myrberg using a binary code constituted by a sequence of (k − 2) signs [+, −] (binary rotation sequence). More or less explicitly, the Myrberg’s papers provide an extension of this notion to the case k → ∞ and to general orbits (iterated sequences).
•
For λ < λ(1)s 1.40115589, . . . , the number of singularities is finite (T is said to be “Morse–Smale”). For λ ≥ λ(1)s , the number of singularities is infinite, and the situation is chaotic (stable or unstable chaos). The parameter λ(1)s is an accumulation value of bifurcations by period doubling (Myrberg cascade called “spectrum” by Myrberg [129] and often wrongly named Feigenbaum cascade [46].
•
The following cascades of bifurcations: “stable (k2i ; j)-cycle→ unstable (k2i ; j)-cycle + stable (k2i+1 ; j )-cycle”, i = 1, 2, 3, . . . ; k having a fixed given value; k = 1, 3, 4, . . . , occurs when λ increases.
0882-Perruquetti-ch01_R2_280705
1.5
Map Singularities and Bifurcations Specific to Noninvertible Maps •
25
For i → ∞, the bifurcation values λb (k2i ; j), from a given period k, have j j a limit point λ(k)s , λ(1)s < λ(k)s < 2, accumulation value by successive j
period doubling from a period k-cycle, limi→∞ λb (k2i ; j) = λ(k)s . •
It is possible to classify all the binary rotation sequences via an ordering law (Myrberg’s ordering law).
•
A binary rotation sequence can be associated with the λ-value resulting from accumulation of bifurcations such that i → ∞ or k → ∞. This rotation sequence satisfies the ordering law.
All these fundamental results have been overlooked, in the contemporary papers dealing with this subject, which has created a very large void since 1978. Most of these results are now often attributed to the authors who rediscovered them later using another forms of quadratic maps, such as the logistic map or maps of the unit interval. Therefore, the characterization of a cycle or an orbit by a binary code was rediscovered by Metropolis [97] where the symbols “R, L” are introduced instead of Myrberg’s symbols “+, −”. It is also the case of the popular notions of invariant coordinate, kneading invariant related to properties of Myrberg’s rotation sequences, now attributed to Milnor and Thurston [100]. The fractal “box-within-a-box” (or embedded boxes) bifurcation structure (structure de bifurcation boîtes emboîtées in French, see Mira [104, 108], Gumowski and Mira [68, 69], Mira et al. [121]) [63], generated by the map (1.1), corresponds to an ordering of the Myrberg cascades (or spectra). It is j∗ made from the nonclassical bifurcation λ = λk resulting from the merging of critical points Cm , m = k, k + 1, . . . , 2k − 1, with the points of a (k; j)-cycle, j which defines a limit of the above accumulation value λ(k)s when k → ∞. Such embedded boxes bifurcation structures are also met for p-dimensional invertible or noninvertible maps, p > 1.
1.5.3
Homoclinic and Heteroclinic Situations: Their Bifurcations
Consider a p-dimensional noninvertible map T. Let U be a neighborhood of an unstable fixed point (saddle, node, or focus) p∗ . The local (i.e., in U) u (p∗ ) of p∗ is defined as the locus of points in U having a unstable set Wloc sequence of increasing rank preimages in U which tends toward p∗ . The global unstable set is the locus of all the points for which a sequence of preimages exists, and converges toward p∗ . It can be obtained by constructing the images of the local unstable set. When the map T is continuous and noninvertible with p > 1, the invariant unstable set W u (p∗ ) of a saddle point p∗ is connected, but self intersections may occur (therefore, it may not be a manifold), which cannot happen for invertible maps. When p = 2, self
0882-Perruquetti-ch01_R2_280705
26
Bifurcation and Chaos in Discrete Models
intersections and loops of W u (p∗ ) are as described earlier (pp. 373–374 of [68], pp. 203–222 of [69], and pp. 506–515 of [121]). The role of critical sets CMq and sets CM−1 of merging preimages is again essential in understanding the formation of self intersections of the unstable set of a saddle fixed point and properties of invariant closed curves. Moreover, the bifurcation of an invariant closed curve turning into a chaotic attractor, by creation of local loops, is possible [121]. The stable set W s (p∗ ) of a saddle p∗ is backward invariant T −1 [W s (p∗ )] = W s (p∗ ). It is mapped into itself by T, T[W s (p∗ )] ⊆ W s (p∗ ). It is invariant if T is invertible, while for a noninvertible map it may be strictly mapped into itself. When T is continuous, self intersections of W s (p∗ ) cannot occur (therefore, it may be called manifold, being either a connected manifold or the union of disjoint connected components). When T is noninvertible with p = 2, W s (p∗ ) may be nonconnected and made up of infinitely many closed curves passing through the increasing rank preimages of p∗ . An equivalent property holds for higher dimensions p > 2. A fixed point or a cycle is called expanding if all its multipliers are |Si | > 1, i = 1, . . . , p, and if there exists a neighborhood U such that the absolute values of the jacobian matrix of T, or T k , is larger than one for each point X ∈ U. In contrast to invertible maps the stable set W s of an expanding point p∗ can be defined [95]. It is made up of the arborescent sequence of increasing rank preimages of this point W s (p∗ ) = ∪n>0 T −n (p∗ ). When a chaotic attractor exists, the unstable set W u of an expanding fixed point is a domain [if an attractor exists W u lies inside a chaotic area when p = 2 (see what follows)] bounded by pieces of critical sets CMq , q = 1, 2, . . . , r. A point q is said to be homoclinic to the non-attracting fixed point p∗ (or homoclinic point of p∗ ) iff q ∈ W s (p∗ ) ∩ W u (p∗ ). Heteroclinic points are obtained when the stable and unstable sets are related to two different fixed points. As indicated earlier a “contact bifurcation” may correspond to homoclinic and heteroclinic bifurcations, and critical sets CMq are useful for interpreting such problems. Classically, for invertible maps homoclinic and heteroclinic situations are defined for n-dimensional diffeomorphisms, n > 1, and only from saddle points. It is worth noting that the first “extended” notion (with respect to the classical one) of homoclinic and heteroclinic points in one-dimensional noninvertible maps, with an indication of its generalization for p-dimensional maps, p > 1, was introduced in Sharkovskij [143]. This was done by defining the stable set of a fixed point as the set of all its preimages of increasing rank. For a one-dimensional noninvertible map, the stable set of an unstable fixed point is made up of the infinite arborescent set of its preimages of increasing rank. The unstable set has at least one branch bounded by this fixed point and a critical point Cq . On the basis of these results, bifurcations by “homoclinic and heteroclinic contact” have been presented for the one-dimensional case (pp. 395–400 of [68] and pp. 294–296 of [108]) with, in an embryonic form, equivalences
0882-Perruquetti-ch01_R2_280705
1.6
Absorbing Areas, Chaotic Areas, Bifurcations
27
of situations for higher dimensions. More extended references are given in Mira [112]. Thus homoclinic and heteroclinic sets, W s ∩ W u , exist not only for saddle points but also for expanding points. More details on definitions and properties are given in Gardini [53] and pp. 13–21 of [121]. Homoclinic and heteroclinic sets are accumulation points of unstable cycles, when their period tend toward infinity, this leading to chaotic situations. In the case of ODEs, such situations result from an accumulation of infinitely many unstable periodic solutions of increasing period (i.e., from unstable subharmonics) and fractional harmonics whose ranks tend toward infinity. According to the case, the accumulation of unstable cycles, or of unstable periodic solutions for ODEs, gives rise [121, 122] either to: an attracting set, called strange attractor (case of the stable chaos) or to a repulsive set, called strange repeller (case of the unstable chaos). In the latter case two situations are possible: either that of a chaotic transient toward an attractor or that of a chaotic basin boundary (or fuzzy boundary) separating the basins of several basins. Such fractal sets have the specificity that their dimension is not an integer and are made up of an inextricable tangle of invariant sets related to unstable cycles with increasing period.
1.6 1.6.1
Absorbing Areas, Chaotic Areas, Bifurcations Definitions and Properties
Consider a two-dimensional noninvertible map T. Critical curves permit to define the essential notions of absorbing area and chaotic area [37, 66–69, 80, 107, 108, 121]. Roughly speaking, an absorbing area (d ) is a region bounded by critical curves arcs of finite, or infinite, rank LCn , n = 0, 1, 2, . . . , l, LC0 ≡ LC, such that the successive images of all points of a neighborhood U(d ), from a finite number of iterations, enter into (d ) and cannot get away after entering. Except for some bifurcation cases, a chaotic area (d) is an invariant absorbing area whose points give rise to iterated sequences (or orbits) having the property of sensitivity to initial conditions. In general it contains infinitely many unstable cycles of increasing period, their corresponding limit sets, and the preimages of increasing rank of all these points. Its boundary ∂d is made up of LCn arcs. Note that a chaotic area may be periodic of period k (i.e., constituted by k nonconnected chaotic areas invariant by T k ). The role of critical curves is also fundamental in the definition of bifurcations leading either to the destruction or to a sudden and qualitative modification of absorbing areas and chaotic areas. In particular, such modifications concern: transitions “simply connected chaotic area → doubly
0882-Perruquetti-ch01_R2_280705
28
Bifurcation and Chaos in Discrete Models
connected chaotic area” (or “annular area”), “nonconnected chaotic area → doubly connected chaotic area.” A chaotic area (d) is destroyed via a bifurcation resulting from the contact of its boundary ∂d with the boundary ∂D(d) of the basin D(d) of (d). Then, as soon as it is destroyed, (d) turns into a strange repeller. All the bifurcation properties of such areas are presented in the aforementioned references. In numerical simulations, the LCn arcs inside a chaotic area appears as a place of higher concentration of iterated points if the map is smooth or as separation of regions with different densities of iterated points if the map is not smooth. This characteristic is directly related to properties of local extremums of the map. An extended notion of absorbing area and chaotic area, that of mixed absorbing area, mixed chaotic area, was also introduced in Barugola et al. [13] and Mira et al. [121]. These areas differ from the nonmixed ones by the fact that their boundaries are now made up of the union of critical curves segments and segments of the unstable set of a saddle fixed point, or a saddle cycle or even segments of several saddle unstable sets associated with different cycles. With respect to a “simple” (nonmixed) absorbing, or chaotic area, these areas are such that successive images of almost all points of a neighborhood enter into the area from a finite number of iterations and cannot get away after entering. The successive images of the points which do not enter into the area are those of the arc [out of (d)] of the stable set of the saddle point on the area boundary. Though not entering the area, these images tend toward the boundary saddle point. Critical curves also play an essential role in the comprehension of the possibility of obtaining points of a same cycle located on both sides of an invariant closed curve (γ ) (Frouzakis et al. [50], and pp. 534–537 of Mira et al. [121]). It is a “pathological” dynamical behavior, not encountered in invertible maps. Moreover, from an invariant closed curve (γ ) infinitely many bifurcations (pp. 534–588 of [121]) give rise first to a weakly chaotic ring and later to a doubly connected chaotic area. Without an important enlargement, a weakly chaotic ring appears numerically as an invariant closed curve, but a section of the enlargement permits to discern a Cantor set. 1.6.2
Chaotic Areas: Microscopic and Macroscopic Points of View
Regarding chaotic areas, or mixed chaotic areas, it is important to emphasize that the purpose of the study of such areas is to obtain the “macroscopic” properties of the chaotic attracting set (defined earlier) leading to the considered area. In particular, these properties are those appearing in a first step from a numerical simulation of the iterated sequences generated by the map. The “microscopic” properties (i.e., the nature of closed invariant sets generated by such maps) or the internal structure of an attractor (if it exists), implies further studies and are more difficult to identify.
0882-Perruquetti-ch01_R2_280705
1.6
Absorbing Areas, Chaotic Areas, Bifurcations
29
This concerns the set of nonwandering points: limit set of the unstable cycles with increasing period, limit set of their unstable set, and limit set of their preimages with increasing rank. Considering the microscopic point of view, it worth noting that in 1979 a very important theorem was formulated [131, 132]. It states that in any neighborhood of a Cr -smooth (r ≥ 2) dynamical system, in the space of dynamical systems (or a parameter space), there exist regions for which systems with homoclinic tangencies (then with structurally unstable or nonrough homoclinic orbits) are dense. Domains having this property are called Newhouse regions. This result is completed in Grochenko et al. [57] which asserts that systems with infinitely many homoclinic orbits of any order of tangency, and with infinitely many arbitrarily degenerate periodic orbits, are dense in the Newhouse regions of the space of dynamical systems. Such a situation has the following important consequence: systems belonging to a Newhouse region are such that a complete study of their dynamics and bifurcations is impossible. Indeed, in many smooth cases, due to the finite time of a simulation, what appears numerically as a chaotic attractor contains a “large” hyperbolic subset in the presence of a finite or an infinite number of stable periodic solutions. Generally, such stable solutions have large periods, and narrow “oscillating” tangled basins, which are impossible to exhibit numerically due to the finite time of observation, and unavoidable numerical errors. Thus it is only possible to consider some of the characteristic properties of the system, their interest depending on the nature of the problem [149]. Such complex behaviors occur for p-dimensional flows (autonomous ODEs) with p > 2, and thus for p ≥ 2 invertible and noninvertible maps. From a macroscopic point of view, the union of the numerous and even infinitely many stable solutions, which are stable cycles for a map, forms an attracting set denoted A. A numerical simulation of the map solution, by definition, is made from a limited number of iterations. Consider the case of a noninvertible map giving rise to a chaotic area, and the elimination of a transient, that is, the simulation is made after N iterations, N being sufficiently large to attain what at first glance appears to be a steady state. Then either the numerical simulation reproduces points of the chaotic area, related to a “strict” strange attractor in the mathematical sense, or it represents a transient toward an attracting set A including stable cycles of large period, a large part of them with a period larger than the simulation duration. The first case, for example, is that of some piecewise smooth maps (i.e., with isolated points of nonsmoothness), not permitting stable cycles (i.e., the Jacobian determinant cannot be sufficiently small). Assuming numerical iterations without error, in the second case the transient would be that toward a stable cycle having a period larger than the number of iterations, this transient occurring inside a very narrow basin, tangled with similar basins of the other stable cycles of large periods. In
0882-Perruquetti-ch01_R2_280705
30
Bifurcation and Chaos in Discrete Models
the presence of unavoidable numerical errors, the iterate points cannot remain inside the same narrow basin. They sweep across the narrow tangled basins of the other cycles of the attracting set A. Then they reproduce a chaotic area bounded by segments of critical curves LCq . This means that this chaotic area coincides with the numerical observation: in the smooth case as a transient toward the attracting set A located inside the area; in the nonsmooth case as a true (in the mathematical sense) strange attractor. Such a property constitutes an important characteristic of the system dynamics. This shows the high interest of the notion of chaotic area, even if in the smooth case it is impossible to numerically discriminate a situation of a strange attractor, in the mathematical sense, from that of an attracting set made up of stable cycles with very large periods.
1.7
Results on Basins and their Bifurcations
Let D be a basin, that is, the open set of points X whose forward trajectories (set of increasing rank images of X) converge toward an attracting set A. This notion, related to global properties of the map, is particularly important for applications. Considering a noninvertible map T, D is invariant under the backward iteration T −1 of T, but not necessarily invariant by T. The basin D and its boundary ∂D satisfy the relations: T −1 (D) = D,
T(D) ⊆ D,
T −1 (∂D) = ∂D,
T(∂D) ⊆ ∂D
Here, the strict inclusion holds iff D contains points of a Z0 region (i.e., with no real preimage). Such a basin may be simply connected as in the invertible case, but also nonconnected, and multiply connected [36, 120]. Its boundary ∂D may contain repulsive sets related to the presence of strange repellers SR. Such an unstable set SR is made up of infinitely many unstable cycles with increasing period, their limit sets of increasing class, the preimages of increasing rank of all these points. As indicated, a set SR gives rise to fractal basin boundaries (or fuzzy boundaries) separating the domain of influence of different attractors and chaotic transients toward a defined attractor [58–60, 105, 106, 121]. Since 1969, several papers have developed the role of critical curves in the bifurcations of type “simply connected basin ↔ non-connected basin” (see pp. 228–261 of [68] and pp. 87–89 of [69]. It is the same for bifurcations of type “simply connected basin ↔ multiply connected basin”. These basic bifurcations always result from the contact of a basin boundary with a critical curve segment and are generated by the same basic mechanism but in many different ways. They are equivalent to the simplest bifurcation, met in one-dimensional maps, with the merging of a
0882-Perruquetti-ch01_R2_280705
1.8
Map Models with a Vanishing Denominator
31
critical point with a point of a basin boundary. All these bifurcations and new ones, with detailed references (see also Mira [112]), as those related to the fractalization of basin boundary, are presented in Mira et al. [121].
1.8
Map Models with a Vanishing Denominator
To simplify the exposition, the map (of invertible or noninvertible type) is a two-dimensional one, and it is assumed that only one of the two functions defining the map T has a denominator which can vanish T : x = F(x, y),
y = G(x, y) =
N(x, y) D(x, y)
where x and y are real variables, F(x, y), N(x, y) and D(x, y) are continuously differentiable functions defined in the whole plane R2 . Hence, the set of nondefinition of the map T (which is given by the set of points where at least one denominator vanishes) reduces to δs = {(x, y) ∈ R2 |D(x, y) = 0}. It is assumed that δs is given by the union of smooth curves of the plane. The two-dimensional recurrence obtained by the successive iterations of T is well defined provided that the initial condition belongs to the set E −k (δ ), where T −k (δ ) denotes the set of the rankgiven by E = R2 \ ∞ T s s k=0 k preimages of δs [i.e., the set of points which are mapped into δs after k applications of T (T 0 (δs ) ≡ δs )]. Indeed, the points of δs , as well as all their preimages of any rank constituting a set of zero Lebesgue measure, must be excluded from the set of initial conditions that generate noninterrupted sequences by the iteration of the map T, so that T : E → E. Such a characteristic is the source of some particular dynamical behaviors, related to the presence of new kinds of singularities and bifurcations, as recently evidenced in Bischi et al. [19], where in particular the situation arising when F(x, y) or G(x, y) assumes the form 0/0 in some points of R2 has been analyzed. In these references new singularities, called focal point and prefocal curve, have been defined which permit the characterization of specific geometric and dynamic properties, together with some new bifurcations. Roughly speaking, a prefocal curve is a set of points which are mapped (or “focalized,“ as we shall say for short) into a single point, called focal point, by the inverse of T (if the map is invertible) or by at least one of the inverses (if the map is noninvertible). These singularities may also be important in the study of maps T defined in the whole plane (then without a vanishing denominator), but such that a determination Ti−1 of the inverse T −1 = ∪ni=1 Ti−1 has a vanishing denominator and possesses a focal point.
0882-Perruquetti-ch01_R2_280705
32
Bifurcation and Chaos in Discrete Models
In particular, this situation gives rise to special kind of chaotic attractors, those presenting knots singular points (see Bischi et al. [19]; Figure 37). Global bifurcations, due to the presence of focal points, cause the creation of structures of basins, specific to maps with a vanishing denominator, called lobes and crescents. They have been explained in terms of contacts between basin boundaries and prefocal curves [18, 19, 24, 26]. These structures have been recently observed in discrete dynamical systems of the plane arising in different contexts [20, 24, 27, 28, 54, 164]. The literature on chaotic dynamical systems mainly concerns bounded attracting sets, while unbounded trajectories are usually considered to be synonymous of diverging trajectories. Also, the definitions of attractor given in the current literature are almost all referring to compact sets [77, 140, 163]. The fact that this may be a restrictive point of view has been recently emphasized by some authors. For example, Brown and Chua [28] write “. . . in defining chaos, no restrictions as to boundedness is reasonable”. Indeed, unbounded chaotic trajectories naturally arise in the iteration of maps with a denominator which can vanish. For example, the existence of a “nonbounded chaotic solution” in a one-dimensional recurrence with denominator has been shown in Mira [108] (see also p. 38 of [121]). The paper Bischi et al. [23] shows examples of unbounded chaotic trajectories and describe some nonclassical (or contact) bifurcations which cause the transition from bounded asymptotic dynamics to unbounded (but not diverging) dynamics, both in one-dimensional and two-dimensional fractional maps. The basic feature of an unbounded and not diverging trajectory is that points of arbitrarily large norm may belong to the trajectory, but they do not give rise to divergence (i.e., these points have images of smaller norm). Of course, this property may cause some difficulties in the numerical iteration of a map by a computer, since an overflow error may occur even if the numerically generated trajectory is not diverging. Furthermore, the occurrence of such a numerical error may be strongly dependent on the kind of computer or the kind of floating-point arithmetic used to perform the calculations. For this reason, even if the paper by Bischi et al. [23] gives some numerical representations of unbounded sets of attraction in order to help the reader to visualize the objects studied, the existence of unbounded chaotic trajectories is shown on the basis of theoretical arguments. The study of peculiar dynamical behaviors of maps with denominator has been motivated by practical reasons, because discrete dynamical systems, obtained by the iteration of maps with denominator, occur often in applications. For example, many iterative methods for finding numerical solutions of equations, based on the well-known Newton method, are expressed by recurrences with a denominator which can vanish [17, 28, 54] as well as implicit methods for the numerical solution of differential equations [164]. Moreover, some discrete-time dynamical systems used to model the evolution of economic and financial systems, which are often
0882-Perruquetti-ch01_R2_280705
1.9
Noise and Chaos: Characterization of Chaotic Behaviors
33
expressed by implicit recurrences F(xn , xn+1 ) = 0, assume the form of recurrences with denominator when they are expressed as xn+1 = f (xn ) [20, 94].
1.9
Noise and Chaos: Characterization of Chaotic Behaviors
From a direct observation of a finite sequence of discrete states Xn generated by a dynamic system, it is difficult to distinguish a purely chaotic behavior (deterministic origin) from a noise effect. In the case of coexistence of these two phenomena the extraction of the chaotic signal presents major difficulties. Considering a m-dimensional dissipative system, Section 1.4.1 has described how a chaotic attractor can result from contraction of an initial volume in certain directions, and stretching toward other directions, leading to a complex folding. This process gives rise to a foliated structure with infinitely many sheets, when the (continuous or discrete) time tends toward infinity. At the limit, the figure becomes locally a Cantor set by section of the direction of contraction. An ordinary attractor A has a different behavior. Indeed it is a subset of the phase space so that, in a sufficiently small neighborhood of A, an initial volume contracts and tends asymptotically toward A. Then, in chaotic situations the corresponding strange attractor is fractal, the dimension of which is not an integer. For processes only known from time series the determination of the attractor dimension presents an interest, related to the fact that such a dimension indicates a deterministic origin for the aperiodicity observed. In the presence of only experimental data, in the form of time series, a fundamental problem is that of discriminating the chaos from the noise, or extracting a deterministic phenomenon from the random noise. For such a purpose the power spectrum technique has limited efficiency. The notion of dimension, which can be done in several ways, is preferred. Thus one has the Kolgomorov’s capacity dimension Dc , an improvement of which is the information dimension DI defined from the information entropy [61]. The measure of correlation between points of a chaotic attractor can be made by the correlation integral, from which the correlation dimension Dco is defined . In general Dco ≤ DI < Dc . From an experimental signal, if Dco is lesser than or equal to the phase space dimension, it is likely that one has a deterministic origin. The advantage of the correlation dimension Dco lies in its determination which is easier to obtain than the Dc and DI ones. The notion of generalized information dimension includes the aforementioned three dimensions as particular cases [74], and leads to a thermodynamic analogy. In presence of time series of only one variable, an important problem is that of the phase space reconstitution. A method is presented in Grassberger and
0882-Perruquetti-ch01_R2_280705
34
Bifurcation and Chaos in Discrete Models
Procaccia [61], the possibilities of which are limited in presence of noise. An interesting approach for the determination of the phase space, and the distinction of a chaotic signal from a random one, is given in Sugihara and May [157] and May [96]. As mentioned earlier, a dimension not defined by an integer globally reflects an action of stretching and contraction, made in different directions on a volume of the phase space, which is reduced to an object having a smaller dimension. Such an action also appears explicitly with the notion of Liapunov’s exponent. A method of calculus is given in Benettin et al., [15], and in Kaplan and Yorke [76]; it is shown that the capacity dimension is related to Liapunov exponents by a relation giving a upper bound of the dimension [61]. The Liapunov exponents can be extracted from experimental time series, after reconstitution of the phase space [41, 42, 44], the problem of noise reduction being considered in Kostelich and Yorke [89] and Hammel et al. [70]. It is worth noting that the Kolgomorov entropy is the sum of positive Liapunov exponents. Such exponents, as well as the use of the aforementioned dimensions, present limitations [43].
1.10
Conclusion
As discussed in Section 1.1, this chapter does not pretend to give a complete view of the scientific field presented here. It is only a guide for acquiring more extended information. Indeed, nonlinear ODEs and invertible maps have given rise to many publications. This is also the case in one-dimensional noninvertible maps, although only recently. The situation is different for the study of two-dimensional noninvertible maps, which remained a long time in an underdeveloped state. It is only in these last years that the interest in this subject has increased. One reason of this situation is the fact that more and more mathematical models of dynamical processes, belonging to different scientific fields, are related to p-dimensional noninvertible maps, p ≥ 2. From 1964 to 1990, studies of two-dimensional noninvertible maps were made by a small number of isolated teams. Even if their number has increased since 1990, the volume of results remains very small with respect to the wide field of unknown properties. The subject of fractal basin boundaries and global properties of chaotic areas from the critical curves properties will certainly become a favorite of researchers in the near future. As for the microscopic properties, till now the results obtained concern only particular maps such as the triangular map. Continuous piecewise linear and piecewise continuous problems have given rise only to isolated results, and might be a choice of research in the future. Taking into account this situation, a fortiori studies of m-dimensional noninvertible maps offer an infinite
0882-Perruquetti-ch01_R2_280705
References
35
domain of investigations from the notion of r-dimensional critical sets, r = 0, 1, . . . , m − 1. A class of open problem concerns the perturbation of a real twodimensional map defined by two functions satisfying the Cauchy– Riemann conditions (cf. p. 421 of [108]). When these conditions are satisfied, the map belongs to the class of one-dimensional maps with a complex variable z = f (z), z = x + jy, j2 = −1, studied in particular by Julia and Fatou at the beginning of the 20th century. If this perturbation leads to the nonverification of the Cauchy–Riemann conditions, then a fractal Julia set (perfect set made up of all the repulsive cycles and their limits) is destroyed. It would be interesting to identify the new fractal set generated after perturbation. Another aspect concerns the study of continuous solutions of nonlinear difference equations associated with multidimensional noninvertible maps and related problems (partial differential equations with nonlinear boundary conditions, wave propagation, etc., cf. Sharkovskij et al. [145–147]). The embedding of an m-dimensional noninvertible map into a p-dimensional invertible map, p = m + 1, . . . , m + q, also opens up a wide field of research [108, 124, 125]. In this case, the p-dimensional invertible map degenerates into the m-dimensional noninvertible map, when a parameter is equal to a “critical” value). Then some properties of p-dimensional map can be derived from those of the m-dimensional case. Results on invertible and noninvertible maps not defined in the whole plane (e.g., maps with denominator which can cancel, see Section 1.8) are only in an embryonic state and limited to two-dimensional maps. For p-dimensional maps, p > 2, focal points and prefocal curves can be extended to h-dimensional focal sets, 0 ≤ h < p − 1, and h -dimensional prefocal sets, 1 ≤ h < p. Such a topic induces a wide field of research from a dynamical point of view, because it also concerns map T without vanishing denominators, but such that one of the determinations Ti−1 of the inverse T −1 = ∪ni=1 Ti−1 has a vanishing denominator.
References 1. R.H. Abraham, The chaos revolution. A personal view, in The Chaos AvantGarde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 2. R.H. Abraham and J.E. Marsden, Foundations of Mechanics, Addison-Wesley Publishing Co., 1985. 3. R.H. Abraham and C.D. Show, Dynamics. The Geometry of Behavior, AddisonWesley Publishing Co., 1992. 4. R.H. Abraham, L. Gardini, and C. Mira, Chaos in Discrete Dynamical Systems (A Visual Introduction in Two Dimension), Springer-Verlag, 1997.
0882-Perruquetti-ch01_R2_280705
36
Bifurcation and Chaos in Discrete Models
5. R.H. Abraham and Y. Ueda, The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 6. R.A. Adomaitis and I.G. Kevrekidis, Noninvertibility and the structure of basins of attraction in a model adaptive control system, J. Non-Linear Sci., 1, 95–105, 1991. 7. R.A. Adomaitis, C.E. Frouzakis, and I.G. Kevrekidis, Global stability analysis of an adaptively-controlled mixing tank experiment, Proceedings of the 1992 American Control Conference/WP4, Chicago, 1992, pp. 1039–1043. 8. R. Allam and C. Mira, Crossroad area-dissymmetrical spring areasymmetrical spring area, and double spring area-crossroad area transition, Int. J. Bif. Chaos, 3 (2), 429–435, 1993. 9. A.A. Andronov, A.A. Witt, and S.E. Khaïkin, Theory of Oscillators, Pergamon Press, 1966. 10. A.A. Andronov, E.A. Leontovich, I.I. Gordon, and A.G. Mayer, Qualitative Theory of Dynamic Systems, Nauka, Moscow, 1966 (in Russian). 11. A.A. Andronov, E.A. Leontovich, I.I. Gordon, and A.G. Mayer, Bifurcation Theory of Dynamical Systems in the Plane, Nauka, Moscow, 1967 (in Russian). 12. L.O. Barsuk, N.M. Belosludstiev, Yu.I. Neimark, and N.M. Salganskaja, Stability of a fixed point in a critical case. Bifurcations, Radiofisica, 11 (11), 1632–1641, 1968 (in Russian). 13. A. Barugola, J.C. Cathala, and C. Mira, Extensions of the notion of chaotic area in second order endomorphisms, Int. J. Bif. Chaos, 5 (3), 751–777, 1995. 14. J.R. Beddington, C.A. Free, and H. Lawton, Dynamics complexity in predator– prey models framed in difference equations, Nature, 255, 58–60, 1975. 15. G. Benettin, L. Galgani, A. Giorgilli, and J.M. Strelcyn, Ljapunov characteristic exponents for smooth dynamical systems and for Hamiltonian systems, Mécanica, 15, 9–32, 1980. 16. L. Billings and J.H. Curry, On noninvertible maps of the plane: eruptions, Chaos, 6, 108–119, 1996. 17. L. Billings, J.H. Curry, and E. Phipps, Symmetric functions and exact Lyapunov exponents, Physica D, 121, 44–64, 1998. 18. G.I. Bischi and L. Gardini, Basin fractalization due to focal points in a class of triangular maps, Int. J. Bif. Chaos, 7 (7), 1555–1577, 1997. 19. G.I. Bischi, L. Gardini, and C. Mira, Maps with denominator. Part 1: some generic properties, Int. J. Bif. Chaos, 9 (1), 119–153, 1999. 20. G.I. Bischi and A. Naimzada, Global analysis of a nonlinear model with learning, Econ. Notes, 26 (3), 143–174, 1997. 21. G.I. Bischi, L. Gardini, and C. Mira, New phenomena related to the presence of focal points in two-dimensional maps, J. Anna. Math. Salesiane (special issue), 13, 81–90, 1999. 22. G.I. Bischi, M. Kopel, and A. Naimzada, On a rent-seeking game described by a non-invertible iterated map with denominator, Nonlinear Analysis, T.M. and A, Proceedings of WCNA, Catania, 2000. 23. G.I. Bischi, L. Gardini, and C. Mira, Unbounded sets of attraction, Int. J. Bif. Chaos, 10 (9), 1437–1470, 2000.
0882-Perruquetti-ch01_R2_280705
References
37
24. G.I. Bischi, L. Gardini, and C. Mira, Maps with a vanishing denominator. A survey of some results, Nonlinear Anal. T.M. A. (special issue), 47, 2171–2185, 2001. 25. G.I. Bischi, M. Kopel, and A. Naimzada, On a rent-seeking game described by a non-invertible iterated map with denominator, Nonlinear Anal. T.M. A. (special issue Proceedings of WCNA 2000), 2001. 26. G.I. Bischi, L. Gardini, and C. Mira, Plane maps with denominator. Part 2: noninvertible maps with simple focal point, Int. J. Bif. Chaos, in press. 27. W.A. Brock and C.H. Hommes, A rational route to randomness, Econometrica, 65 (5), 1059–1095, 1997. 28. R. Brown and L.O. Chua, Clarifying Chaos: examples and counterexamples, Int. J. Bif. Chaos, 6 (2), 219–249, 1996. 29. J.P. Carcassès, C. Mira, C. Simo, and J.C. Tatjer, Crossroad area-spring area transition, (I) parameter plane representation, Int. J. Bif. Chaos, 1 (1), 183–196, 1991. 30. J.P. Carcassès, An algorithm to determine the nature and the transitions of communication areas generated by one dimensional map, Proceeding of ECIT 91, Lisbon, Portugal (September 15–21, 1991), World Scientific, Singapore, 1992, pp. 27–38. 31. J.P. Carcassès, Determination of different configurations of fold and flip bifurcation curves of one, or two-dimensional map, Int. J. Bif. Chaos, 1 (1), 869–902, 1993. 32. J.P. Carcassès, A new kind of parametric singularities and their use for the study of the bifurcation structure of a n-dimensional map, Nonlinear Anal. Theor. Methods Appl., 28 (5), 917–946, 1997. 33. J.P. Carcassès and H. Kawakami, Appearance and disappearance of a dovetail stucture in the parameter plane of a n-dimensional map, Int. J. Bif. Chaos, 9 (4), 769–783, 1999. 34. J.P. Carcassès and H. Kawakami, Existence of a cusp point on a fold bifurcation curve and stability of the associated fixed point. Case of a n-dimensional map, Int. J. Bif. Chaos, 9 (5), 875–894, 1999. 35. J.C. Cathala, Sur la dynamique complexe et la détermination d’une zone absorbante pour un système à données échantillonnées décrit par une récurrence du second ordre, RAIRO Autom., 16 (2), 175–193, 1982. 36. J.C. Cathala, Case where the influence domain of a stable attractor of a R endomorphism is a multiply connected domain, Proceedings of International Symposium on Iteration Theory, Caldes de Malavella, Spain, September 20–26, 1987, World Scientific, Singapore, 1987, pp. 161–166. 37. J.C. Cathala, On some properties of absorptive areas in second order endomorphisms, Proceedings of ECIT 89 (European Conference on Iteration Theory) Batschuns, Austria, September 1989, World Scientific, 1991, pp. 42–54. 38. J.C. Cathala, C. Mira, and H. Kawakami, Singular points with two multipliers S1 = +1, S2 = −1 in the bifurcation curves of maps, Int. J. Bif. Chaos, 2 (4), 1001–1004, 1992. 39. B. Cessac, B. Doyon, M. Quoy, and M. Samuelides, Mean-field equations, bifurcation map and route to chaos in discrete time neural networks, Physica D, 74, 24–44, 1994.
0882-Perruquetti-ch01_R2_280705
38
Bifurcation and Chaos in Discrete Models
40. L.O. Chua, Global unfolding of Chua’s circuit, IEICE Trans. Fundam. Electron. Commun. Comp. Sci., 76-SA, 704–734, 1993. 41. R. Conte and M. Dubois, Lyapunov exponents of experimental systems, in Non-Linear Evolutions, J.P.P. Leon, Ed., World Scientific, 1988, pp. 767–780. 42. J.P. Eckmann, S. Oliffson, Kamphorst, D. Ruelle and S. Ciliberto, Lyapunov exponents from time series, Phys. Rev., A34, 4971–4979, 1986. 43. J.P. Eckmann and D. Ruelle, Fundamental limitations for estimating dimensions and Ljapunov exponents in dynamical systems, IMES, 1989, preprint. 44. J.D. Farmer and J.J. Sidorowich, Predicting chaotic time series, Phys. Rev. Lett., 59, 845–848, 1988. 45. O. Feely and L.O. Chua, Nonlinear dynamics of a class of analogue-to-digital converters, Int. J. Bif. Chaos, 2 (2), 325–340, 1992. 46. M.J. Feigenbaum, Quantitative universality for a class of nonlinear transformation, J. Statist. Phys., 19, 25–52, 1978. 47. D. Fournier-Prunaret and N. Gicquel, Bifurcation and chaotic phenomena in an order two DPCM sytem, Proceeding of ECCTD 95, Istanbul, 1995. 48. C.E. Frouzakis, R.A. Adomaitis, I.G. Kevrekidis, M.P. Golden, and B.E. Ydstie, The structure of basin boundaries in a simple adaptive control system, Proceedings of NATO 1992, T. Bountis, Ed., Advanced Summer Institute Patras, Plenum, NY, 1992, pp. 195–210. 49. C.E. Frouzakis, R.A. Adomaitis, and I.G. Kevrekidis, An experimental and computational study of global stability for the adaptively controlled tank, Comp. Chem. Eng., 20, suppl. B, 1029–1034, 1996. 50. C.E. Frouzakis, L. Gardini, I.G. Kevrekidis, G. Millerioux, and C. Mira, On some properties of invariant sets of two-dimensional noninvertible maps, Int. J. Bif. Chaos, 7 (6), 1167–1194, 1997. 51. L. Gardini, Global analysis and bifurcations in two-dimensional endomorphisms by use of critical lines, Proceedings of ECIT (European Conference on Iteration Theory) Lisbona, Portugal, September 91, World Scientific, Singapore, 1992, pp. 114–125. 52. L. Gardini, On a model of financial crisis. Critical lines as new tools of global analysis, in Nonlinear Dynamics in Economics and Social Sciences, F. Gori, L. Geronazzo, and M. Galeotti, Eds., Springer-Verlag, NY, 1993. 53. L. Gardini, Homoclinic bifurcations in n-dimensional endomorphisms, due to expanding periodic points, Nonlinear Anal. Theor. Methods Appl., 23 (8), 1039– 1089, 1994. 54. L. Gardini, G.I. Bischi, and D. Fournier-Prunaret, Basin boundaries and focal points in a map coming from Bairstow’s method, Chaos, 9 (2), 367–380, 1999. 55. N. Gicquel and D. Fournier-Prunaret, Comportement dynamique et erreur de prédiction dans un système de transmission MICDIF, Proceeding of GRETSI 95, Juan les Pins, September 18–21, 1995. 56. A. Giraud, Applications des récurrences à l’étude de certains systèmes de commande, Thèse d’ Ingénieur-Docteur, Faculté des Sciences de l’Université de Toulouse, 21 avril, 1969. 57. V.S. Gonchenko, D.V. Turaev, and L. Shilnikov, On models with a non-rough homoclinic Poincaré curve, Physica D, 62, 1–14, 1993. 58. C. Grebogi, E. Ott, and J.A. Yorke, Fractal basin boundaries, long-lived chaotic transients and unstable-stable pair bifurcations, Physical Rev. Lett., 50 (13), 935–938, 1983.
0882-Perruquetti-ch01_R2_280705
References
39
59. C. Grebogi, E. Ott, and J.A. Yorke, Chaos, strange attractors, and fractal basin boudaries in nonlinear dynamics, Science, 238, 632–638, 1987. 60. C. Grebogi, S.M. Hammel, J.A. Yorke, and T. Sauer, Shadowing of physical trajectories in chaotic dynamics: containment and refinement, Phys. Rev. Lett., 65 (13), 1527–1530, 1990. 61. P. Grassberger and I. Procaccia, Measuring the strangeness of strange attractors, Physica 9D, 189–208, 1983. 62. J. Guckenheimer, G.F. Oster, and A. Ipaktchi, The dynamics of density depended population models, J. Math. Biol., 4, 101–147, 1977. 63. J. Guckenheimer, The bifurcations of quadratic functions, N.Y. Acad. Sci., 75/1, 343–347, 1980. 64. J. Guckenheimer and P. Holmes, Nonlinear Oscillator, Dynamical Systems and Bifurcations of Vector Fields, Springer-Verlag, New York, 1983. 65. J. Guckenheimer and R.F. Williams, Structural stability of the attractor in a Lorenz model, Inst. Hautes Etudes Sci. Publ. Math., 50, 59–72, 1979. 66. I. Gumowski and C. Mira, Solutions chaotiques bornées d’une récurrence ou transformation ponctuelle du second ordre à inverse non unique, C. R. Acad. Sci. Paris, Sér. A, 285, 477–480, 1977 (in French). 67. I. Gumowski and C. Mira, Bifurcation déstabilisant une solution chaotique d’un endomorphisme du 2nd ordre, C. R. Acad. Sci. Paris, Sér. A, 286, 427–431, 1978 (in French). 68. I. Gumowski and C. Mira, Dynamique chaotique. Transformations ponctuelles. Transition ordre désordre, Cépadues Editions Toulouse, 1980. 69. I. Gumowski and C. Mira, Recurences and Discrete Dynamic Systems, Lecture Notes in Mathematics, 809, Springer Verlag, 1980. 70. S.M. Hammel, J.A. Yorke, and C. Grebogi, Do numerical orbits of chaotic dyanmical processes represent true orbits? J. Complexity, 3, 136–140, 1987. 71. M. Hasler, Synchronization principles and applications, in Circuits and Systems Tutorial, C. Toumazou, Ed., IEEE ISCAS’94, London, 1994, pp. 314–327. 72. C. Hayashi, Nonlinear Oscillations in Physical Systems, McGraw-Hill, New York, 1964. 73. Ch. Hayashi, Y. Ueda, and H. Kawakami, Periodic solutions of Duffing’s equation with reference to doubly asymptotic solutions, Proceedings of 5th International Conference on Non-Linear Oscillations, Kiev, 1969, pp. 235–255. 74. H.G.E. Hentschel and I. Procaccia, The infinite number of generalized dimensions of fractals and strange attractors, Physica 8D, 435–444, 1983. 75. P. Holmes and R.F. Wiliams, Knotted periodic orbits in suspensions of smale’s horseshoe: Torus knots and bifurcation sequences, Arch. Rat. Mech. Anal., 90 (2), 115–195, 1985. 76. J.L. Kaplan and J.A. Yorke, Chaotic behavior of multidimensional difference equations, in Functional Difference Equations, Lecture Notes in Math, 730, pp. 204–228, 1979. 77. A. Katok and B. Hasselblatt, Introduction to the Modern Theory of Dynamical Systems, Cambridge University Press, 1995. 78. H. Kawakami, C.R. Acad. Sci. Paris, 293 (Sér. I), 401–403, 1981. 79. H. Kawakami, Bifurcation of periodic responses in forced dynamics nonlinear circuits: computation of bifurcation values of the system parameters, IEEE Trans. Circuits Syst., CAS-31 (3), 248–260, 1984.
0882-Perruquetti-ch01_R2_280705
40
Bifurcation and Chaos in Discrete Models
80. H. Kawakami and K. Kobayashi, Computer experiments on chaotic solutions of x(t + 2) − ax(t + 1) − x2(t) = b, Bull. Fac. Eng., Tokushima Univ., 16, 29–46, 1979. 81. H. Kawakami and J. Matsuo, Bifurcation of doubly asymptotic motions in nonlinear systems, IEICE Trans., J65-A (7), 647–654, 1982. 82. H. Kawakami and M. Sekaï, Synchronization Phenomena Observed in a Duffing–Rayleigh Equation, Publication NLP83-37, Tokushima University, 1983 (in japanese). 83. H. Kawakami and M. Sekaï, Synchronization Phenomena and Hopf Bifurcation, Publication NLP84-7, Tokushima University, 1984, pp. 25–33 (in japanese). 84. H. Kawakami and M. Sekaï, Synchronization and chaos in a Duffing-Rayleigh oscillator, in Asymptotic Methods of Mathematical Physics, (collection of scientific papers), Kiev, Naukova Dumka, 1988, pp. 83–92. 85. Y. Kevrekidis, R.A. Adomaitis, and R. de la Llave, Predicting the Complexity of Disconnected Basins of Attraction for a Noninvertible System, Systems Research Center, Technical Report #TR91-41, University of Maryland, 1991. 86. Y. Kevrekidis, R.A. Adomaitis, and R. de la Llave, On the Dynamics and Global Stability Characteristics of Adaptive Control Systems, Systems Research Center, Technical Report #TR91-100, University of Maryland, 1991. 87. H. Khammary, Sur le comportement complexe des oscillations forcées de systèmes non linéaires soumis à une excitation sinusoïdale (in French), Thèse de Doctorat en génie Electrique de l’Ecole Nationale d’Ingénieurs de Tunis (12 Février 1999). 88. H. Khammary, J.P. Carcasses, and C. Mira, Higher harmonic resonances in a RLC circuit, to be published in Int. J. Bif. Chaos, 2006. 89. E.J. Kostelich and J.A. Yorke, Noise reduction in dynamical systems, Phys. Rev., A38, 1649–1652, 1988. 90. T.Y. Li and J.A. Yorke, Exploring chaos on an interval, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 91. V. Maistrenko, Yu. Maistrenko, and I. Sushko, Noninvertible two-dimensional maps arising in radiophysics, Int. J. Bif. Chaos, 4 (2), 383–400, 1994. 92. V. Maistrenko, Yu. Maistrenko, and I. Sushko, Period adding phenomenon in piecewise linear endomorphisms arising from electronic systems, Proceedings of Workshop NDES 1994, Krakow, Poland, 1994, pp. 39–44. 93. Yu. Maistrenko and I. Sushko, Bifurcation phenomena in auto oscillations systems with delay leading to two-dimensional piecewise linear maps, Proceedings of Workshop NDES 1995, Dublin, Ireland, 1995, pp. 83–87. 94. R. Marimon and S. Sunder, Expectations and learning under alternative monetary regimes: an experimental approach, Econ. Theor., 4, 131–162, 1994. 95. J.R. Marotto, Snap-back repellers imply chaos in Rn , J. Math. Anal. Appl., 63, 199–223, 1978. 96. R.M. May, Le chaos en Biologie, La Recherche, 22 (232), 589–598, 1991 (in French). 97. N. Metropolis, M.L. Stein, and P.R. Stein, On limit finite sets for the transformation of the unit interval, J. Comb. Theor., (A), 15, 25–44, 1973.
0882-Perruquetti-ch01_R2_280705
References
41
98. G. Millérioux and C. Mira, Homoclinic and heteroclinic situations specific to two-dimensional nonivertible maps, Int. J. Bif. Chaos, 7 (1), 39–70, 1997. 99. G. Millérioux and C. Mira, Coding scheme based on chaos synchronization from noninvertible maps, Int. J. Bif. Chaos, 8 (8), 1812–1824, 1998. 100. J. Milnor and R. Thurston, On Iterated Maps of the Interval, Princeton University Press, 1977, unpublished notes. 101. C. Mira, Etude d’un premier cas d’exception pour une récurrence, ou transformation ponctuelle, du deuxième ordre, C. R. Acad. Sci. Paris, Sér. A, 269, 1006–1009, 1969. 102. C. Mira, Etude d’un second cas d’exception pour une récurrence, ou transformation ponctuelle, du deuxième ordre, C. R. Acad. Sci. Paris, Sér. A, 270, 332–335, 1970. 103. C. Mira, Sur les cas d’exception d’une récurrence, ou transformation ponctuelle, du deuxième ordre, C. R. Acad. Sci. Paris, Sér. A, 270, 466–469, 1970. 104. C. Mira, Accumulations de bifurcations et structures boîtes-emboîtées dans les récurrences et transformations ponctuelles, in Proceedings of the 7th International Conference on Nonlinear Oscillations, Berlin, September 1975, Akademic Verlag, Berlin 1977, Band I2, 1975, pp. 81–93. 105. C. Mira, Sur la notion de frontère floue de stabilité, in Proceedings of the 3rd Brazilian Congress of Mechanical Engineering, Rio de Janeiro, December 1975, D4, 1975, pp. 905–918. 106. C. Mira, Frontière floue séparant les domaines d’attraction de deux attracteurs, C. R. Acad. Sci. Paris, Sér. A, 288, 591–594, 1979. 107. C. Mira, Complex dynamics in two-dimensional endomorphisms, Nonlinear Anal., T.M. A., 4 (6), 1167–1187, 1980. 108. C. Mira, Chaotic Dynamics. From the One-Dimensional Endomorphism to the TwoDimensional Diffeomorphism, World Scientific, Singapore, 1987, 450 pp. 109. C. Mira, Systèmes asservis non linéaires, Hermès, Paris, 1990, 425 pp. (in French). 110. C. Mira, On some bifurcations structures occurring in nonlinear dynamics, in Proceedings of the Second Symposium on Nonlinear Theory and Its Applications (NOLTA 91), Fukuoka, July 1991, pp. 107–114. 111. C. Mira, Some historical aspects of nonlinear dynamics. Possible trends for the future, Double publication: (1) Int. J. Bif. Chaos, 7 (9 and 10), 2145–2174, 1997. (2) J. Franklin Inst., 334B (5/6), 1075–1113, 1997. 112. C. Mira, Chaos and fractal properties induced by noninvertibility of models in the form of maps, Chaos Solitons Fractals, (11), 251–262, 2000. 113. C. Mira and J.C. Roubellat, Cas où le domaine de stabilité d’un ensemble limite attractif d’une récurrence n’est pas simplement connexe, C. R. Acad. Sci. Paris, Sér. A, 268, 1657–1660, 1969. 114. C. Mira and J.P. Carcassès, On the crossroad area–saddle area and crossroad area–spring area transitions, Int. J. Bif. Chaos, 1 (3), 641–655, 1991. 115. C. Mira, J.P. Carcassès, C. Simo, and J.C. Tatjer, Crossroad area–spring area transition. (II) Foliated parametric representation, Int. J. Bif. Chaos, 1 (2), 339– 348, 1991. 116. C. Mira and H. Kawakami, Qualitative modifications of the lip bifurcation structure, in Proceedings of the European Conference on Iteration Theory, ECIT’92,
0882-Perruquetti-ch01_R2_280705
42
117. 118.
119. 120.
121.
122. 123.
124.
125.
126. 127. 128. 129. 130. 131. 132. 133.
134. 135.
Bifurcation and Chaos in Discrete Models Batschuns, September 13–19, 1992 (Austria), Förg-Rob et al., Eds., World Scientific, 1992, pp. 199–203. C. Mira and I. Djellit, Bifurcations structure in a model of frequency modulated CO2 laser, Int. J. Bif. Chaos, 3 (1), 97–129, 1993. C. Mira and M. Qriouet, On a ‘Crossroad area–spring area’ transition occurring in a Duffing–Rayleigh equation with periodical excitation, Int. J. Bif. Chaos, 3 (4), 1029–1037, 1993. C. Mira, H. Kawakami, and R. Allam, The dovetail bifucation structure and its qualitative changes, Int. J. Bif. Chaos, 3 (4), 1029–1037, 1993. C. Mira, D. Fournier-Prunaret, L. Gardini, H. Kawakami, and J.C. Cathala, Basin bifurcations of two-dimensional noninvertible maps: fractalization of basins, Int. J. Bif. Chaos, 4 (2), 343–381, 1994. C. Mira, L. Gardini, A. Barugola, and J.C. Cathala, Chaotic Dynamics in TwoDimensional Noninvertible Maps, World Scientific Series on Nonlinear Sciences, Ser. A, Vol. 20, 1996, 630 pp. C. Mira, G. Millerioux, J.P. Carcasses, and L. Gardini, Plane foliation of twodimensional noninvertible maps, Int. J. Bif. Chaos, 6 (8), 1439–1462, 1996. C. Mira, H. Kawakami, and M. Touzani-Qriouet, Bifurcations structures generated by the non-autonomous Duffing equation, Int. J. Bif. Chaos, 9 (7), 1363–1379, 1999. C. Mira, H. Abdel-Basset, and H. El-Hamouly, Implicit approximation of a stable saddle manifold generated by a two-dimensional quadratic map, Int. J. Bif. Chaos, 9 (8), 1535–1547, 1999. C. Mira and C. Gracio, On the embedding of a (p − 1)-dimensional non invertible map into a p-dimensional invertible map (p = 2, 3), Int. J. Bif. Chaos, in press. P.J. Myrberg, Iteration von Quadratwurzeloperationen. I, Ann. Acad. Sci. Fenn., Ser. A, 256, 1–10, 1958. P.J. Myrberg, Iteration von Quadratwurzeloperationen. II, Ann. Acad. Sci. Fenn., Ser. A, 268, 1–10, 1959. P.J. Myrberg, Sur l’itération des polynômes réels quadratiques, J. Math. Pures Appl., 41 (9), 339–351, 1962. P.J. Myrberg, Iteration von Quadratwurzeloperationen. III, Ann. Acad. Sci. Fenn., Ser. A, 336, 1–10, 1963. Yu.I. Neimark, The Method of Point Mappings in the Theory of Non Linear Oscillations, Nauka, Moscow, 1972 (in Russian). S.E. Newhouse, Diffeomorphisms with infinitely many sinks, Topology, 13, 9–18, 1974. S.E. Newhouse, The abundance of wild hyperbolic sets and non-smooth stable sets for diffeomorphisms, Publ. Math. IHES, 50, 101–151, 1979. M. Ogorzalek and H. Dedieu, Chaos control technics for signal processing, in Proceedings of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Halkidiki, Greece, 1995. E. Ott, C. Grebogi, and J.A. Yorke, Controlling chaos, Physi. Rev. Lett., 64 (11), 1196–1199, 1990. T.S. Parker and L.O. Chua, Practical Numerical Algorithms for Chaotic Systems, Springer-Verlag, 1989.
0882-Perruquetti-ch01_R2_280705
References
43
136. L.M. Pecora and T.L. Carol, Synchronization in chaotic systems, Phys. Rev. Lett., 64, 821–824, 1990. 137. M. Quoy, B. Cessac, B. Doyon, and M. Samuelides, Dynamical behaviour of neural networks with dicrete time dynamics, Neural Network World, 3 (6), 845–848, 1993. 138. M. Qriouet and C. Mira, Fractional harmonic synchronization in the DuffingRayleigh differential equation, Int. J. Bif. Chaos, 4 (2), 411–426, 1994. 139. Rico-Martinez, R. Adomaitis, and Y. Kevrekidis, Noninvertibility in neural networks, Proceedings of the 1993 IEEE International Conference on Neural Networks, San Francisco, 1993, pp. 382–386. 140. C. Robinson, Dynamical Systems, CRC Press, 1995. 141. O.E. Rössler, Chaos, hyperchaos and the double perspective, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 142. A.N. Sharkovskij, Coexistence of cycles of a continous map of a line into itself, Ukrain. Mat. J., 16 (1), 61–71, 1964. 143. A.N. Sharkovskij, Problem of isomorphism of dynamical systems, in Proceeding of the 5th International Conference on Nonlinear Oscillations, Vol. 2, Kiev, 1969, pp. 541–544. 144. A.N. Sharkovskij, On some properties of discrete dynamical systems, in Proceedings of Théorie de l’iteration et ses applications, Toulouse, Ed., CNRS, 1982, pp. 153–158. 145. A.N. Sharkovskij and E. Yu. Romanenko, Ideal turbulence: attractors of deterministic systems may lie in the space of random fields, Int. J. Bif. Chaos, 2 (1), 31–36, 1992. 146. A.N. Sharkovskij, Yu.L. Maistrenko, and E.Yu. Romanenko, Difference Equations and Their Applications, Series Mathematics and Its Applications, Kluwer Academic Publishers, 1993, 358 pp. 147. A.N. Sharkovsky, Yu.L. Maistrenko, Ph. Deregel, and L.O. Chua, Dry turbulence from a time-delayed Chua’s circuit, J. Circuits Syst. Comp., 3 (2), 645–668, 1993. 148. L.P. Shilnikov, Strange attractors and dynamical models, J. Circuits Syst. Comp., 3, 1–10, 1993. 149. L.P. Shilnikov, Mathematical problem of nonlinear dynamics: a tutorial, Int. J. Bif. Chaos, 7 (9), 1953–2001, 1997. 150. L. Shilnikov, A. Shilnikov, D. Turaev, and L. Chua, Methods of Qualitative Theory in Nonlinear Dynamic, Part I (see also Part II, 2001). World Scientific, Singapore, 1998. 151. T. Shinbrot, C. Grebogi, E. Ott, and J.A. Yorke, Using small perturbations to control chaos, Nature, 363, 411–417, 1993. 152. S. Smale, Morse inequalities for a dynamical system, Bull. Am. Math. Soc., 66, 43–49, 1960. 153. S. Smale, Diffeomorphisms with many periodic points, in Differential Combinatorial Topology, S.S. Cairns, Ed., Princeton University Press, 1963, pp. 63–80. 154. S. Smale, Structurally stable systems are not dense, Am. J. Math., 88, 491–496, 1966.
0882-Perruquetti-ch01_R2_280705
44
Bifurcation and Chaos in Discrete Models
155. S. Smale, Differentiable dynamical systems, Bull. Am. Math. Soc., 73, 747–817, 1967. 156. S. Smale, Finding a horseshoe on the beaches of Rio, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 157. G. Sugihara and R.M. May, Nature, (344), 734–740, 1990. 158. M. Touzani-Qriouet and C. Mira, Reducible fractional harmonics generated by the nonautonomous Duffing–Rayleigh equation. Pockets of reducible hartmonics and Arnold’s tongues, Int. J. Bif. Chaos, 10 (6), 1345–1366, 2000. 159. Y. Ueda, The Road to Chaos, Aerial Press, Inc., Santa Cruz, USA, 1992. 160. Y. Ueda, Strange attractors and the origin of chaos, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 161. Y. Ueda, My encounter with chaos, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 162. Y. Ueda, Reflections on the origin of the broken-egg chaotic attractor, in The Chaos Avant-Garde. Memories of the Early Days of Chaos Theory, World Scientific Series on Nonlinear Science, L.O. Chua, Ed., Series A, Vol. 39, 2000, 219 pp. 163. S. Wiggins, Introduction to Applied Nonlinear Dynamical Systems and Chaos, Springer-Verlag, 1990. 164. H.C. Yee and P.K. Sweby, Global asymptotic behavior of iterative implicit schemes, Int. J. Bif. Chaos, 4 (6), 1579–1611, 1994. 165. T. Yoshinaga, H. Kitajima, H. Kawakami, and C. Mira, A method to calculate homoclinic points of a two dimensional noninvertible map, IEICE Trans. Fundam., E80-A (9), 1560–1566, 1997.
0882-Perruquetti-ch02_R2_290705
2 Tools for Ordinary Differential Equations Analysis
W. Perruquetti
CONTENTS 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Biology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.2 Chemistry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 Electricity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.4 Electrical Motors . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.5 Mechanics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 First-Order Differential Equation . . . . . . . . . . . . . . . . . . . . 2.2.1 Notion of Solution . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1.1 Phase Portrait Solution . . . . . . . . . . . . . . . . 2.2.1.2 Existence . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1.3 Extension, Uniqueness, and Global Solution 2.2.1.4 Dependence of the Initial Conditions . . . . . 2.2.2 Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.2.1 Autonomous Linear Case . . . . . . . . . . . . . . 2.2.2.2 Nonlinear Autonomous Case . . . . . . . . . . . 2.2.3 Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Some Characterizations of Behaviors . . . . . . . . . . . . . . . . . 2.3.1 Remarkable Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1.1 Equilibrium Point . . . . . . . . . . . . . . . . . . . . 2.3.1.2 Orbits: Periodic, Closed, Homoclinic, and Heteroclinic . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2 Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2.1 Invariance . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2.2 Liapunov Stability . . . . . . . . . . . . . . . . . . . 2.3.2.3 Attractivity . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2.4 Asymptotic Stability . . . . . . . . . . . . . . . . . . 2.3.2.5 Exponential Stability . . . . . . . . . . . . . . . . . 2.4 Autonomous Linear Case . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
46 47 47 48 49 49 50 52 52 53 56 58 58 59 60 61 62 62 62
. . . . . . . .
. . . . . . . .
. . . . . . . .
65 67 67 68 70 72 74 75 45
0882-Perruquetti-ch02_R2_290705
46
Tools for ODE Analysis
2.4.1 Formal Computation of Solution . . . . . . . . . . . . . . . . . . 2.4.2 Stability Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 Behavior Studies: Local Results . . . . . . . . . . . . . . . . . . . . . . . . 2.5.1 Structural Stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5.1.1 Whitney Distance . . . . . . . . . . . . . . . . . . . . . . . 2.5.1.2 Equivalence . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5.1.3 Structural Stability . . . . . . . . . . . . . . . . . . . . . . 2.5.2 From Linear Model to Nonlinear Model . . . . . . . . . . . . 2.5.2.1 Structural Stability Theorem and Consequences 2.5.2.2 Local Structure of Solution Within a Neighborhood of an Equilibrium Point . . . . . . . 2.5.2.3 Local Structure of the Solutions in the Neighborhood of a Closed Orbit . . . . . . . . . . . . 2.6 Bifurcation and Chaos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.1 Parameter Dependence . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.2 Local Bifurcation Locale with Codimension 1 . . . . . . . . 2.6.2.1 Subcritical or Saddle–Node . . . . . . . . . . . . . . . . 2.6.2.2 Transcritical Bifurcation . . . . . . . . . . . . . . . . . . 2.6.2.3 Supercritical . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.3 Chaos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1
75 77 79 79 79 79 80 80 81 82 86 88 88 91 92 93 94 95 98
Introduction
Many physical modeling activities of the 16th century were conducted within the framework of infinitesimal calculus (nowadays known as differential calculus). Indeed, these models are relations between variables which are functions of a special variable named “time” and their derivatives with respect to this time variable: these relations are ordinary differential equations (ODEs). Isaac Newton (1642–1727) in his 1687 memoir titled Philosophiae naturalis principiae mathematica wrote: “Data aequatione quotcunque fluentes quantitae involvente fluxiones invenire et vice versa” (he is underlying the fundamental role played by ODE). Since then, many physical process were described using ODEs (e.g., in the 17th century Euler–Lagrange equations were used to describe mechanical systems).
0882-Perruquetti-ch02_R2_290705
2.1
Introduction
47
ODE models are used in several fields ranging from biology to mechanics.
2.1.1
Biology
Consider bacterium are growing on a substrate in a Petri box. Let x be the bacterium number, a simplified model, called the logistic model, is: dx = ax(xmax − x) dt
(2.1)
where a is a strictly positive constant and xmax is the maximum number of bacteria which can live in the box. Indeed, when there are few bacteria: x˙ ∼ ax (exponential growth) and when x is close to xmax , the growth is reduced since x˙ ∼ 0. Another example is the Volterra model for predator– prey co-evolution (see Example 3 in Section 2.3.1).
2.1.2
Chemistry
Different balance sheets (of matter, thermodynamics) can, when reduced to their lowest terms, be expressed using ODEs. For example, let us consider a tank filled with two chemicals A and B, whose concentrations are, respectively, cA and cB , with respective flows of u1 and u2 calculated by the use of two pumps. In this vat, a mixer homogenizes both products, which react according to: k1
nAA + nB B −→ ←− nC C k2
where nA, nB , and nC are, respectively, the stoichiometric coefficients of A, B, and C. The mixture is flowing off the vat through an aperture of section s to the base of this vat (whose section is S = 1 m2 ). The balance sheet of matter conducts, using the Bernoulli relation, is: S
dh = u1 + u2 − 2sgh dt
where h is the height of mixture in the tank and g is the gravitational constant (9.81 m sec−2 ). Laws of the kinetics give the relation (under the hypothesis of a second-rate kinetics): 2 vcin = −k1 cAcB + k2 cC
0882-Perruquetti-ch02_R2_290705
48
Tools for ODE Analysis
Therefore: d(hcA) = u1 cA0 − 2sghcA − nAvcin h dt d(hcB ) = u2 cB0 − 2sghcB − nB vcin h dt d(hcC ) = − 2sghcC + nC vcin h dt with cA0 = cA (entering) and cB0 = cB (entering) . Denoting the state vector by x = (h, hcA, hcB , hcC )T , the model reads as: √ x˙ 1 = u1 + u2 − 2sg x1 (−k1 x2 x3 + k2 x42 ) 2sg ˙ x2 = u1 cA0 − x2 − nA x x1 1 (−k1 x2 x3 + k2 x42 ) 2sg ˙ x = u c − x − n 2 B0 3 B 3 x1 x1 (−k1 x2 x3 + k2 x42 ) x˙ 4 = − 2sg x4 + nC x1 x1
2.1.3
(2.2)
Electricity
An electrical system is made of a resistor R, an inductance L, and a capacitor C, each in a branch of a triangle. Let us note, respectively, iX and vX to be the current and the voltage in the branch where X is. Assuming that L and C are linear and that only the resistor R is nonlinear but satisfies the generalized Ohm’s law (vR = f (iR )); the Kirchhoff laws leads to: diL L = vL = vC − f (iL) dt C dvC = i = −i C L dt
(2.3)
If in this ODE, called Liénard equation, one considers the particular case where f (x) = (x3 − 2µx), then one gets the Van der Pol equation. Another famous example is the Chua’s circuit: a nonlinear resistor Rnl , satisfying the generalized Ohm’s law: 1 i = f (v) = Gb + (Ga − Gb ){|v1 + E| − |v1 − E|} 2 in parallel with a capacitor C1 coupled through a resistor R to an inductance L with linear resistor R0 in parallel with an other capacitor C2 . Denoting
0882-Perruquetti-ch02_R2_290705
2.1
Introduction
49
the current of the inductance by i and the voltages of the capacitors C1 and C2 by, respectively, v1 and v2 arrive at the following model: v2 − v1 dv1 C1 = − f (v1 ) dt R v1 − v2 dv1 C2 = +i dt R di L = v2 + R0 i dt
2.1.4
(2.4)
Electrical Motors
For a stepper motor with n pairs of teeth, the electromagnetic balance (in the dq frame called Park frame) is: did = vd − Rid + nLq ωiq dt diq = vq − Riq − nLd ωid − nmir ω Lq dt
Ld
Cem = n(Ld − Lq )id iq + nmir iq + Kd sin(nθ ) where m and ir are, respectively, the inductance and the fictuous rotor current, leading to the constant flux mir (permanent magnet); id , iq , vd , vq are the currents and voltages in the dq frame, respectively. The mechanical balance is: dθ =ω dt dω J = Cem − Cload dt
2.1.5
Mechanics
If a mechanical system is made of n links connected by means of perfect joints (without friction), one will have the position of the system which will depend on n independent parameters (generalized coordinates denoted by q1 , . . . , qn ). To write the Euler–Lagrange equations, the lagrangian must be determined (difference between the kinetic energy and the potential energy): L = Ec − Ep
(2.5)
0882-Perruquetti-ch02_R2_290705
50
Tools for ODE Analysis
the elementary work of each internal and external forces Di , as well as the work of friction forces: ∂D dqi , − ∂ q˙ i gives some dissipative energy D. One thus obtains the well-known Euler– Lagrange system: d ∂L ∂L ∂D + = Di (2.6) − dt ∂ q˙ i ∂qi ∂ q˙ i Let us note that the kinetic energy Ec = (1/2)˙qT M(q)˙q, with M(q) an n × n positive definite matrix, depends on qi and their derivatives q˙ i , whereas the potential energy Ep depends only on qi . For a pendulum (θ being the angle between the rope and the vertical position) one gets L = (1/2)ml2 θ˙ 2 − mgl(1 − cos(θ )). Neglecting the friction terms one gets: g θ¨ = − sin(θ ) l
(2.7)
When dealing with such models, several questions arise: what do we mean by a solution to such an ODE? Do there exist conditions ensuring the existence of such a solution? Some results will be discussed in Section 2.2. Beyond these existence conditions, one can ask about the qualitative properties of such solutions: can we characterize asymptotic behavior (see Section 2.3 devoted equilibrium points, limit cycle and strange attractor)? Section 2.4 deals with the particular case of linear systems which, along with Section 2.5, presents tools to analyze and characterize the asymptotic behavior of solution near such sets. Lastly, almost every physical system involves in its model some parameters which, when varying, may modify the qualitative properties of the solutions: which is the scope of Section 2.6.
2.2
First-Order Differential Equation
An implicit ODE is of the following form:
dy dk y F t, y, ,..., k dt dt
= 0,
y ∈ Rm
(2.8)
with F defined on an open set of R × Rm(k+1) and taking a value in Rm . The order of the ODE is the integer k which is the higher order derivative in the
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
51
relation (2.8). Let us note that (2.1), (2.2), and (2.7) are of order, respectively, 1, 1, and 2. The implicit function theorem ensures that the m relations in (2.8) can be expressed (at least locally) as an explicit ODE as:
dk−1 y dy dk y , . . . , k−1 = G t, y, dt dtk dt
(2.9)
as soon as: det (JF ) = 0 where JF is the jacobian matrix of function F; this is a matrix with entries aij =
∂Fi k
∂ d xj
/dtk
(i, j) ∈ {1, . . . , m}2
Note that when the variable y in the implicit ODE (2.8) belongs to a more general set than the cartesian product of open set in R, then letting
dy dk−1 y x = y, , . . . , k−1 dt dt
T
the explicit ODE (2.9) can be written in the form: dx = f (t, x), dt
t ∈ I, x ∈ X
(2.10)
In this expression: t ∈ I ⊂ R represents the time variable and X is the state space.1 For practical reasons, the state space may be bounded in order to take into account physical limitations. In general, the state space is a differentiable manifold. When the vector x contains a variable and its successive derivatives, X is then called phase space. However, some authors (p. 11 of [2]) use the two designations without discrimination. The vector x ∈ X is the state vector of (2.10) (sometimes the phase vector according to the situation). In practice, it contains a sufficient number of variables useful to describe the time evolution of the process; x(t) is the instantaneous state at time t and f : I × X → TX (tangent space), (t, x) → f (t, x), is the vector field. To simplify the rest of the presentation, we will consider the particular case where I × X is an open of Rn+1 and TX is Rn . 1 Words used in the field of automatic control.
0882-Perruquetti-ch02_R2_290705
52 2.2.1
Tools for ODE Analysis Notion of Solution
When speaking about solution, one has to state precisely the associated problem: for ODE, there exist a boundary problem2 and an initial condition problem (called the Cauchy Problem, CP): “Do there exist a function: φ : I ⊂ R → X ⊂ R n (CP): t → φ(t) satisfying (2.10) and the given initial condition: φ(t ) = x ?” 0
0
We are looking for a sufficiently smooth function of time φ : t → φ(t), whose time derivative is (for almost all times3 ) the same as the value of the vector field evaluated at the same instant and at the location given by this function x = φ(t). If f (u, φ(u)) is measurable,4 then one can rewrite φ(t) in the following form: φ(t) = φ(t0 ) +
t
f (v, φ(v)) dv
(2.11)
t0
the integral has to be understood in the Lebesgue sense and this, even if t → f (t, ·) is not continuous with respect to t [which may be useful when dealing with x˙ = g(t, x, u) because a discontinuous feedback of the form u = u(t) can be used]. Thus, we will look for functions which are at least absolutely continuous5 with respect to time. 2.2.1.1
Phase Portrait Solution DEFINITION 1 Asolution of (2.10) originating from x0 at t0 is any absolutely continuous function φ defined on a non-empty set I(t0 , x0 ) ⊂ I ⊂ R which contains t0 : φ : I(t0 , x0 ) ⊂ I ⊂ R → X ⊂ Rn t → φ(t; t0 , x0 ), 2 Similar to the CP, for which the data of initial condition is replaced by n data φ σ (i) (ti ) at given times ti , i ∈ N = {1, . . . , n}, σ : N → N. 3 This to say for all times t ∈ T \ M, with M a set of zero measure, using the following notation
T \ M = {x ∈ T : x ∈ / M}. 4 This holds if, for x fixed, t → f (t, x) is measurable and for t fixed, x → f (t, x) is continuous. 5 φ : [α, β] → Rn is absolutely continuous if ∀ε > 0, ∃δ(ε) > 0 : ∀{]α , β [} i i i∈{1,...,n} , ]αi , βi [ ⊂ [α, β], ni=1 (βi − αi ) ≤ δ(ε) ⇒ ni=1 φ(βi ) − φ(αi ) ≤ ε. φ is absolutely continuous if and only if there exists a Lebesgue integrable function which is the derivative of φ almost everywhere.
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
53
in short denoted by φ(t), which satisfies (2.11) for all t ∈ I(t0 , x0 ) (or equivalently: φ˙ = f (t, φ(t)) for almost all time in I(t0 , x0 )) and such that φ(t0 ) = x0 .
Example 1 Using separation of variables, the logistic equation (2.1) becomes: dx ax(xmax − x)
= dt
which can be used to obtain a solution to the CP (2.1), x(0) = x0 : φ : R −→ R t → φ(t; 0, x0 ) = DEFINITION 2
x0 xmax x0 + e−axmax t (xmax − x0 )
(2.12)
A solution of (2.10) can be viewed:
•
Either in the extended state space I × X named the space of motion, in that case one is talking about motion or trajectory
•
Or in the state space X , in which case one is talking about orbit.
The set of all possible orbit oriented with respect to time is called the phase portrait. Usually, when drawing the phase portrait, only accumulating sets are drawn as time tends to ±∞. For example, for the following system:
1 − x12 − x22 dx = dt 1
−1 1 − x12
− x22
x,
t ∈ R, x ∈ R2
(2.13)
the fundamental elements of the phase portrait (see Figure 2.1) are the origin and the unit circle C1 : starting from any initial condition out of the origin orbits converge to C1 ; otherwise, the state remains at the origin. 2.2.1.2 Existence The CP may sometimes not have a solution or sometimes have many solutions. Indeed, the system dx = |x|1/2 , dt x(0) = 0
x∈R
(2.14)
0882-Perruquetti-ch02_R2_290705
54
Tools for ODE Analysis x2
1.4 1.2 1 0.8 0.6 0.4 0.2
–1 –0.8
0.2 0.4 0.6 0.8 1
–0.4 –0.2
1.2 1.4 x1
–0.4 –0.6 –0.8 –1 FIGURE 2.1 Unit circle: simulation of (2.13).
has an infinite number of solutions (see Figure 2.2) defined by: ε ∈ R+ ,
φε : R → R 0 (t − t − ε)2 0 t → φε (t) = 4 (t − t0 + ε)2 − 4
if t0 − ε ≤ t ≤ t0 + ε if t0 + ε ≤ t
(2.15)
if t ≤ t0 − ε
Thus, one may wonder whether there exist conditions ensuring the existence of one or many solutions to the CP. According to the smoothness of function f one can distinguish the following five cases A, B, C, D, and E. CASE A If function f is continuous with respect to x and eventually discontinuous with respect to t (but measurable), then there exist absolutely continuous solutions to the CP.
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
55
x 3 2 1 –4
–3
–2
–1
1 –1
2
3
4
t
–2 –3 FIGURE 2.2 Infinite number of solutions to the CP of (2.14).
THEOREM 1 (Carathéodory, 1918) [8]
Assume that: A1. f is defined for almost all t on a ”barrel”: B = {(t, x) ∈ I × X : |t − t0 | ≤ a, x − x0 ≤ b}
(2.16)
A2. f is measurable with respect to t for all fixed x, continuous with respect to x for all fixed t and such that f (t, x) ≤ m(t) holds on B, with m being a positive function which is Lebesgue-integrable on |t − t0 | ≤ a. Then, there exist at least one solution (absolutely continuous) to the CP which is defined at least on an interval like [t0 − α, t0 + α], α ≤ a. One can prove the existence of two solutions such that any other solution lies between these two [8, 18]. CASE B If the function f is continuous with respect to (t, x), then there exist continuously differentiable solution (this is class C 1 solution). THEOREM 2 (Peano, 1886) [7]
Assume that: B1. f is defined for all t on the ”barrel” B defined by (2.16) B2. f is continuous on B defined by (2.16)
0882-Perruquetti-ch02_R2_290705
56
Tools for ODE Analysis
barrel B x0 + b
x0
t
t0 + a t0 +
x0 – b
b maxτ
f(t,x)
FIGURE 2.3 Euler approximates.
Then there exist at least one solution to the CP belonging to the C 1 class of functions and defined at least on an interval like [t0 − α, t0 + α], α = min(a, b/maxB f (t, x) ). The proof is based on Euler approximates, which are polygonal lines (see Figure 2.3) defined by: φ0 = x0 φn (t) = φn (ti−1 ) + f (ti−1 , φn (ti−1 ))(t − ti−1 ), i ti = t0 + α, i = {0, . . . , n} n
ti−1 < t ≤ ti
These functions constitute a family of equicontinuous functions defined on [t0 − α, t0 + α], converging. Then, using the Ascoli–Arzela lemma one can extract a family φn uniformly converging to a continuous function φ which satisfies: φ(t) =
lim φ (t) n→+∞ n + lim
t
n→+∞ t 0
= x0 +
t
lim f (v, φn (v)) dv
t0 n→+∞
dφn (v) − f (v, φn (v)) dv. dt
So φ is a solution of (2.11) since limn→+∞ (dφn /dt)(v) − f (v, φn (v)) = 0. 2.2.1.3 Extension, Uniqueness, and Global Solution √ Obviously, in example (2.14), solutions to the CP exist ( f : x → |x| is continuous) but are nonunique. To ensure uniqueness, the function f should
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
57
be “smoother than continuous”: for example, locally Lipschitz with respect to the second variable x is sufficient, as defined subsequently. f is said to be locally Lipschitz on X if: ∀x0 ∈ X , ∃δ > 0 and k(t) integrable:
DEFINITION 3
∀(x, y) ∈ Bδ (x0 ) = {x : x − x0 ≤ δ} ⇒ f (t, x) − f (t, y) ≤ k(t) x − y . f is said globally Lipschitz on X if: ∃k(t) integrable : ∀(x, y) ∈ X 2 , f (t, x) − f (t, y) ≤ k(t) x − y . These properties are said to be uniform if k does not depends on t. PROPOSITION 1
Any C 1 (I × X ) function with norm of the jacobian bounded by an integrable function, is locally Lipschitz. If, in addition, X is compact (this is to say closed and bounded since X is a subset of Rn ), then the function is globally Lipschitz. Under assumption f being locally Lipschitz with respect to x, it may happen that a solution φ defined on I1 can be extended to a larger interval I2 ⊃ I1 , and thus defines a new function φ˜ defined on I2 ⊃ I1 and such that φ˜ | I1 = φ. Thus, in order to not weigh down the notations, I(t0 , x0 ) = ]α(t0 , x0 ), ω(t0 , x0 )[ will indicate thereafter the greatest interval on which one can define a solution passing at time t0 through x0 and which cannot be extended: the solution will be known as maximum solution. CASE C If the function f is locally Lipschitz with respect to x and possibly discontinuous in t (but measurable), then there exist a unique maximum solution which is absolutely continuous. THEOREM 3
If in Theorem 1, the assumption on the continuity given in A2 is replaced by ”f locally lipschitz on x − x0 ≤ b,” then there exists a unique solution (absolutely continuous) to the problem of Cauchy defined on I(t0 , x0 ) ⊃ {t ∈ I : |t − t0 | ≤ α}. Similarly, if f is continuous in (t, x) and locally Lipschitz in x, then there is a unique C 1 solution to the CP. The evidence of these results is based on the Picard–Lindelöf approximates: φ0 = x0 t φn+1 (t) = x0 + t0 f (v, φn (v)) dv b t ∈ [t0 − α, t0 + α], α = min a, maxB f (t, x)
0882-Perruquetti-ch02_R2_290705
58
Tools for ODE Analysis
which shows that they converge uniformly towards a solution. Then, the uniqueness of the solution is shown by contradiction. CASE D If the function f has a norm which is bounded by a affine function, that is, ∀(t, x) ∈ (I × X ) (possibly almost everywhere): f (t, x) ≤ c1 x + c2 with c1 and c2 strictly positive, then by using the lemma of Gronwall, one can conclude that any solution to the CP is defined on I. CASE E If the system is “dissipative” and if f is locally lipschitz, then the CP admits a unique maximum solution for any t ≥ t0 (I = R, X = Rn ). The property of dissipativity can be expressed such as: “there exists α ≥ 0, β ≥ 0, v ∈ Rn such that for any t ∈ R and any x ∈ Rn : < x − v, f (t, x) >≤ α − β x 2 ” or using Liapunov6 functions [17], such as “there exist V and W : Rn → R+ continuous, positive definite on a compact A (i.e., V(x) ≥ 0 and V(x) = 0 ⇔ x ∈ A), such that for any t ∈ R and any x ∈ Rn \A7 : < ∂V ∂x , f (t, x) >≤ −W(x).” 2.2.1.4
Dependence of the Initial Conditions
THEOREM 4
Under assumptions of Theorem 3, the solution to the problem of Cauchy t → φ(t; t0 , x0 ) defined on I(t0 , x0 ) is continuous with respect to each one of its arguments. In particular, if t is sufficiently close to t0 , then φ(t; t0 , x0 ) is also close to x0 . This proximity can be studied for very large moments: it is the question of stability (see Section 2.3.2).
2.2.2
Classification
The ODE (2.10) is said to be autonomous if the time variable t does not appear explicitly in the equation, thus (2.10) is in the form:
DEFINITION 4
dx = g(x), dt
t ∈ I, x ∈ X
On the contrary (2.10) is said to be non-autonomous. 6 Alexander Mikhaïlovich Liapunov, Russian mathematician and physicist. After completing
his studies at the University of St. Petersbourg (where he was the student of P.L. Tchebychev), he was an Assistant Professor and then Professor at the University of Kharkov. In 1902, he got a Professor position at the University of St. Petersbourg. 7 Notation A\B is the difference of two sets A and B : A\B = {x ∈ A : x ∈ / B}.
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
59
If one knows all the solutions of an autonomous ODE which take the value x at time t, then one can get all the solutions which pass through this point at an other time just by using a time shift of the first set. Thus an autonomous ODE can only be used to model physical phenomena that do not depend on the initial time (e.g., a “rolling stone”). Note that the length of I(t0 , x0 ) does not depend on the initial time. A nonlinear non-autonomous vector field f (t, x) is said to be T-periodic if there exists a real number T > 0 such that for any t and any x : f (t + T, x) = f (t, x).
DEFINITION 5
If one knows the solutions on a time interval of length T, then one can get the solution on the entire time interval of definition just by time translation.
2.2.2.1 Autonomous Linear Case When (2.10) is of the form: dx = Ax + b dt the ODE is said to be autonomous linear. Then there exits a unique solution to the CP (since Ax + b is globally uniformly Lipschitz) given by: A(t−t0 )
x(t) = e
x0 + e
At
t
e
−Av
dv b
t0
or x(t) = ri=1 eλi t pi (t) + c, where λi is the eigenvalue of A and pi (t) is the polynomial vector of degree less than the multiplicity order of the corresponding eigenvalues λi . Section 2.4 gives more precise results when b = 0. This kind of model has the following properties: 1. Initial time has no influence on the time evolution of the state vector (the ODE is autonomous) 2. If b = 0 (resp. b = 0), then a linear combination (resp. convex) of the solution is still a solution: this is the linear property of the system.
0882-Perruquetti-ch02_R2_290705
60
Tools for ODE Analysis
For such a model one can note that after an infinite time the state vector x: 1. Either converges to a constant vector value (called an “equilibrium point”) 2. Or diverges (the norm of x becomes infinite) 3. Or oscillates: when one observes their evolutions, they evolve/move on a closed curve (as the circle): this is what is called a closed cycle (e.g., business cycle, cyclic population, and mass attached to a spring). Lastly, if A and b depend on time, the system is known to be linear non-autonomous (or nonstationary): in addition to the aforementioned behaviors one finds the dependence of the solutions on the initial time. Note that when A(t) is a T-periodic function continuous on R, one can formally study the solutions using the theory of Floquet [13] which states that there is P(t) a one-to-one transformation T-periodic and continuous, z(t) = P(t)x(t), such that z˙ = Mz + c(t), with M a constant matrix satisfying ˙ + P(t)A(t)P(t)−1 and c(t) = P(t)b(t). M = P(t) 2.2.2.2 Nonlinear Autonomous Case When (2.10) is of the form: dx = g(x) dt
(2.17)
the ODE is said to be nonlinear autonomous. Generally, one cannot get an explicit solution of these ODEs except for very particular cases. In addition to the aforementioned behaviors in the autonomous linear case, one can mention: 1. Limit cycle: they are closed curves in X toward or from which the trajectories of the system move. 2. Phenomenon of chaos: these behaviors, governed by ODEs (deterministic), are seemingly random. One of the characteristics is the sensitivity to the initial conditions: two very close initial conditions will give rise to two completely different evolutions (see Section 2.6). 3. Strange attractor: it is in general a set of noninteger dimensions, which expresses some “roughness” of the object. For example, a surface is of dimension 2, a volume is of dimension 3, whereas a snowflake having infinite ramifications is of noninteger dimension ranging between 2 and 3. When the trajectories move toward (resp. move away from) this set, it is known as “strange attractor (resp. repeller).” Often,
0882-Perruquetti-ch02_R2_290705
2.2
First-Order Differential Equation
61
the presence of attractor or strange repeller is a sign of chaos, however, in certain cases the chaotic phenomenon is only transitory and disappears after a sufficiently long time (see Section 2.6.3).
2.2.3
Flow
Here, one supposes the existence and uniqueness of a solution (maximum) to the CP associated with (2.17), denoted as φ(t; t0 , x0 ). If the vector field is complete, that is, I(x0 ) = R, and if one knows a solution for a couple (t0 , x0 ), then one will have all the others (for fixed x0 ) by time shifting. Consider the mapping which, for any initial condition, associates its maximum solution at the time t: tg : X → X x0 → φ(t; 0, x0 ) If the vector field g of the ODE (2.17) makes it possible to generate a unique maximum solution for all (t0 , x0 ) of R × X and defined on I(x0 ) = R (resp. on [α, ∞[, on [α, ω] with α and ω finite), then the generating application tg is called a flow (resp. a semi-flow or a local flow). DEFINITION 6
According to the assumptions, tg is one-to-one; therefore, there is at least a local flow. The justification of the notation tg becomes obvious when computing the flow of an homogeneous autonomous linear ODE: x˙ = Ax, tg = eAt . If g is of class C k (resp. C ∞ , analytic), the associated flow tg , is a local diffeomorphism of class C k (resp. C ∞ , analytic) for any time t where it is defined. In particular, if the flow tg is defined for any t ∈ R, then it defines a one parameter group of local diffeomorphisms of class C k (resp. C ∞ , analytic) (see p. 55–63 of [2]): tg : x0 → tg (x0 ) is C ∞ tg ◦ sg = t+s g 0g = Id
(2.18) (2.19) (2.20)
One deduces, ∀t ∈ R, ∀x0 ∈ X : tg (x0 ) = −t −g (x0 )
(2.21)
t−t tg ◦ −t g = g = Id
(2.22)
t (tg )−1 = −t g = −g
(2.23)
0882-Perruquetti-ch02_R2_290705
62
Tools for ODE Analysis
The duality characterized by (2.23) is important since, if one knows the phase portrait of the dynamic system (2.17) for positive times, its dual for negative times is obtained quite simply by reversing the go through direction of the orbits. This property is used in the trajectory-reversing method allowing, in two dimension (and sometimes three), to precisely determine the majority of the phase portraits by combining the qualitative study of the nonlinear vector field to simulations [5, 6, 9, 10, 21]. The Lie bracket (or commutator) defined by: [g1 , g2 ] =
∂g2 ∂g1 g1 − g2 ∂x ∂x
gives the condition of commutation of two vector flows tg1 and sg2 . THEOREM 5
Let g1 and g2 be two C ∞ complete vector fields defined on X (e.g., Rn ). Then: ∀t, ∀s,
tg1 ◦ sg2 = sg2 ◦ tg1 ⇐⇒ [g1 , g2 ] = 0
In automatic control, the noncommutation of the vector fields has a very important application since it makes it possible to characterize the atteignability (local version of the controllability) of a controlled system of type x˙ = g1 (x) + g2 (x)u [16].
2.3
Some Characterizations of Behaviors
Recall the ODE considered (2.10): dx = f (t, x), dt
2.3.1
t ∈ I, x ∈ X
Remarkable Sets
2.3.1.1 Equilibrium Point For some initial conditions, the system remains “frozen,” that is, the state does not evolve/move any more: one will speak then about equilibrium points. xe ∈ X is an equilibrium point for the system (2.17) if all the solutions φ(t; 0, xe ) of (2.17) are defined on [0, +∞[ and satisfy:
DEFINITION 7
φ(t; 0, xe ) = xe ,
∀t ∈ [0, +∞[
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
63
Example 2
The solution to CP (2.1), x(0) = x0 is given by (2.12). It is easy to check that x = 0 and x = xmax are equilibrium points. One can give a similar definition for (2.10) by taking into account the fact that the solutions then depend on the initial time. Thus, a point can be an equilibrium only for certain initial times. If xe is an equilibrium point, then for the system to remain at this point it is necessary that the speed is null (i.e., g(xe ) = 0). However, this condition alone is not √ sufficient as shown with the study of (2.14): there are xe = 0 solutions of x = 0, but there is an infinite number of solutions which leave this point (see Section 2.2.1). THEOREM 6 ([11])
xe is an equilibrium point for the system (2.17) if and only if: 1. (2.17) admits a unique solution defined on [t0 , +∞[ to the Cauchy problem 2. g(xe ) = 0 Thereafter, one will consider that the equilibrium point is the origin: indeed, the study of (2.17) in the neighborhood of an equilibrium point xe is brought back, by the change of coordinates y = x − xe , to the study of y˙ = g(y + xe ), having for equilibrium (y = 0).
Example 3 The Volterra–Lotka system is a simple model of fight between two species. In 1917, during the war, the biologist Umberto d’Ancona noted an increase in the number of selacians (sharks) in the northern part of the Adriatic Sea. In order to explain this phenomenon, he called upon his father-inlaw, the mathematician Vito Volterra, who explained this phenomenon in the following way. Let an infinite volume of water (e.g., Adriatic Sea) be populated by two species: one, carnivorous (C: selacians), chasing the other, herbivorous (H: shrimps). Let us note x and y the respective numbers of individuals of the species (H) and (C). If only the species (H) populated the sea, it would develop with an exponential rate8 and the speed of growth of the species (H) would be: (dx/dt) = αx, with α > 0. On the other hand, the development and survival of species (C), if alone, cannot be assured. Therefore, its speed of variation would be: (dy/dt) = −βy, with β > 0. When the two species cohabit, the carnivorous (C) devour the herbivores (H). By assuming that with each meeting of a carnivore with an herbivore, the latter is devoured and that the number of meetings is proportional to the product of the volumic densities of the two species (thus, also with xy), one can conclude that the evolution of the two species is governed by the 8 One makes the assumption here that its development is limited neither by space nor by the quantity of food.
0882-Perruquetti-ch02_R2_290705
64
Tools for ODE Analysis
differential connection: dx = αx − γ xy (herbivorous) dt dy = −βy + δxy (carnivorous) dt
(2.24)
with α, β, γ , δ being positive numbers. In this case, the state variables are introduced in a natural way: x, y. One can suppose a priori that the state space is the quarter of plan R2+ . Theorem 3 makes it possible to guarantee the existence and uniqueness of the solutions, and Theorem 6, the existence of two equilibrium points (0, 0) and (β/δ, α/γ ). By separating the variables according to dx/(x(α − γ y)) = dy/(y(−β + δx)), one can show that H(x, y) = [α ln(y) − γ y] + [β ln(x) − δx] is a constant function along the solutions of (2.24). One shows thus that, for any initial condition strictly included in the quarter of strictly positive plan, the orbits of the system are closed. Moreover, solutions are defined on R: one obtains a flow whose phase portrait is given in Figure 2.4 (simulation for α = β = γ = δ = 1). 2.5 x2
2.0
1.5
1
0.5
0
FIGURE 2.4 Limit cycle of (2.24).
0.5
1
1.5
2
x1
2.5
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
65
The orbits are centered around the equilibrium point (β/δ, α/γ ). Before the war, the activity of fishing was more important (one takes into account fishing activity “−qx x” and “−qy y” in (2.24), with qx , qy positive): that is, the couple of parameters (α, −β) are replaced by (α − qx , −β − qy ); therefore, the equilibrium point (β/δ, α/γ ) is replaced by ((β + qy )/δ, (α − qx )/γ ). This explains a displacement of the cycle during the war and therefore an increase in the number of celacians. DEFINITION 8
One classifies the equilibrium points (xe ) of (2.17) in two
categories: 1. Hyperbolic points (or nondegenerated): it is those for which the corresponding jacobian matrix9 Jg (xe ) does not have any eigenvalue with null real part ( Jg (xe ) is also known as hyperbolic). 2. Nonhyperbolic points (or degenerated): it is those for which the jacobian matrix Jg (xe ) has at least one eigenvalue with null real part ( Jg (xe ) is known as degenerated). As we will see in Section 2.5.2, this distinction is important since, for any hyperbolic point, one knows the behavior of the solutions locally, whereas it is not inevitably the case for the nonhyperbolic points. 2.3.1.2
Orbits: Periodic, Closed, Homoclinic, and Heteroclinic
The study of nonlinear systems highlights particular orbits: 1. The closed orbits which are an extension of the fixed points (or equilibrium) since, if one lets a system to evolve starting from an initial condition belonging to this orbit, then it will continue to evolve on this orbit; 2. Homoclinic and heteroclinic orbits which connect equilibrium points. The following definitions are inspired by p. 87–88 of [24], p. 8 of [25], p. 113–117 of [14], and [12]. The solution φ(t; t0 , x0 ) is T-periodic (periodic with period T), if I(t0 , x0 ) = R and if there exists a positive real λ, such that for any real t one has φ(t + λ; t0 , x0 ) = φ(t; t0 , x0 ). The smallest positive number λ noted T is called the period of the solution. In this case, the corresponding orbit is a periodic orbit of period T (or T-periodic orbit).
DEFINITION 9
9 If g is a vector field on Rn , then its jacobian matrix at the point x is the matrix (∂g /∂x )(x) . i j
0882-Perruquetti-ch02_R2_290705
66
Tools for ODE Analysis 3 x2 2
1
–2
–1
1
2
x1
–1
FIGURE 2.5 Periodic closed orbit of the Van der Pol oscillator (2.25).
DEFINITION 10 γ is a closed orbit if γ is an orbit and a Jordan curve (i.e., homeomorphic10 to a circle).
Any orbit corresponding to a nontrivial T-periodic solution (nonidentical to an equilibrium point) is a closed orbit. The reciprocal one is true in the case of autonomous systems.
Example 4 If one looks again at the Van der Pol equation, that is, the Equation (2.3) with f (x) = (x3 − 2µx), then denoting by iL = −x2 , vC = x1 , L = C = 1, (2.3) becomes: dx1 = x2 dt dx2 = 2µx2 − x23 − x1 dt
(2.25)
Thus, for µ > 0, one can show (p. 211–227 of [15]) the existence of γ , a periodic orbit represented in Figure 2.5. Ahomoclinic orbit is an orbit which connects an equilibrium point to itself. If an orbit connects two distinct equilibrium points it is known as heteroclinic (Figure 2.6 and Figure 2.7).
DEFINITION 11
10 A homeomorphism is a continuous morphism. Thus, the Jordan curve is a curved obtain
by continuous transformation starting from a circle.
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
67
FIGURE 2.6 Homoclinic orbit.
2.3.2
Properties
In this section, one considers the system (2.10) and assumes that there is at least one solution to the CP.
2.3.2.1 Invariance Physical systems often have the tendency, in certain configurations, to satisfy a principle of less effort: “here I am, here I remain” (equilibrium points, periodic orbits, etc.). This property of invariance can be extended to more complex sets.
FIGURE 2.7 Heteroclinic orbit.
0882-Perruquetti-ch02_R2_290705
68
Tools for ODE Analysis
f(t ; t0, x0) x0
A
a(t0, x0)
t0
ω(t0, x0)
t
FIGURE 2.8 Invariance of A.
Let J ⊂ I. A nonempty compact set A ⊂ X is J -invariant if: ∀t0 ∈ J , ∀x0 ∈ A, ∀t ∈ I(t0 , x0 ) : φ(t; t0 , x0 ) ∈ A (Figure 2.8).
DEFINITION 12
2.3.2.2 Liapunov Stability Remarkable sets (equilibrium points, periodic orbits, etc.) can characterize configurations with minimal energy for a physical system. These systems can tend to seek one of these configurations rather than another, according to the concepts of stability. For example, the pendulum with mass in vertical position (2.7) has two equilibria: one above the horizontal, θ = π , θ˙ = 0, the other below θ = 0, θ˙ = 0. It is well known that the mass naturally tends to the bottom position rather than to the upper one. The bottom position of the equilibrium is stable, the other one unstable. From another point of view, the maximum solution x(t; t0 , x0 ) of an ODE is continuous with respect to the three variables t, t0 , x0 (under some conditions, see Section 2.2.1). Therefore, if two solutions x(t; t0 , x01 ) and x(t; t0 , x02 ) are taken with x01 close to x02 , continuity implies that these two solutions are close on some time interval [t0 , t], without any indication on the size of this interval. One can obtain a proximity of these two solutions on an interval of rather large time as stated in the problem of Liapunov stability for a particular solution (equilibrium point, periodic orbit, set or a given trajectory). Thereafter, A is a non-empty compact set (e.g., an equilibrium point) of X endowed with a distance d. ρ(x, A) = inf y∈A d(x, y) is a distance from the point x to the set A. Lastly, I(t0 , x0 ) = ]α(t0 , x0 ), +∞[. DEFINITION 13
A is Liapunov stable with respect to J ⊂ I for (2.10) if:
∀t0 ∈ J , ∀ε > 0, ∃δ(t0 , ε) > 0 such that: ∀x0 ∈ X : ρ(x0 , A) ≤ δ(t0 , ε) ⇒ ρ(φ(t; t0 , x0 ), A) ≤ ε,
∀t ≥ t0
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
69
f(t ; t0,x0)
d(t0, ε) x0
ε
ε s(
)
t0
∞
t
FIGURE 2.9 Stability of the A and its stability domain Ds (A).
When J = I = R, A is said to be Liapunov stable. When δ(t0 , ε) = δ(ε) do not depend on t0 , the stability property is said to be uniform. In the particular case of the autonomous nonlinear systems (2.17), for any neighborhood of A, there is a positively invariant neighborhood of A (included in the first) (see p. 58 of [4]). These definitions can be stated in more general topological terms: for example, an equilibrium point xe is Liapunov stable for (2.17) if, for any neighborhood V(xe ) of xe , there is a neighborhood W(xe ) of xe such that: x0 ∈ W(xe ) ⇒ φ(t; t0 , x0 ) ∈ V(xe ), ∀t ≥ t0 . In general, for (2.10), this definition is stated as: for all t0 ∈ J and any neighborhood V(A) of A, there exists a neighborhood W(t0 , V) of A such that any trajectory resulting from this neighborhood W(t0 , V) at the time t0 evolves in the first neighborhood V(A) without leaving it (see Figure 2.9). However, if t0 is fixed, for each neighborhood V(A), it is useful to know the largest of these neighborhood W(t0 , V), which will be denoted Ds (t0 , V, A): this corresponds to the concept of stability domain of stability [the intersection of the sets Ds (t0 , V, A)]. For (2.10), Ds (t0 , A) is the Liapunov stability domain with respect to t0 of the set A if:
DEFINITION 14
1. ∀ε > 0, Ds (t0 , ε, A) ⊂ X is a neighborhood of A
0882-Perruquetti-ch02_R2_290705
70
Tools for ODE Analysis 2. For ε > 0, x0 ∈ Ds (t0 , ε, A) iff: ρ(φ(t; t0 , x0 ), A) ≤ ε, ∀t ≥ t0 3. Ds (t0 , A) = ∪ε>0 Ds (t0 , ε, A) Ds (J , A) is the Liapunov stability domain with respect to J of the set A
if: 1. ∀t0 ∈ J , Ds (t0 , A) exists 2. Ds (J , A) = ∪t0 ∈J Ds (t0 , A) Ds (A) is the Liapunov stability domain of A if: Ds (A) = Ds (J = R, A). For (2.10), Dus (J , A) is the Liapunov uniform stability domain with respect to J of the set A if:
DEFINITION 15
1. Dus (J , A) is a neighborhood of A 2. x0 ∈ Dus (J , A) iff: ∀t0 ∈ J , ∀ε > 0, ρ(φ(t; t0 , x0 ), A) ≤ ε, ∀t ≥ t0 Dus (A) is the Liapunov uniform stability domain of A if: Dus (A) = Dus (J = R, A). Let us symbolize schematically by (•) one of the four following qualifiers: Liapunov stable with respect to J , Liapunov stable, Liapunov uniformly stable with respect to J , Liapunov uniformly stable. If D(•) (J , A) = X (the state space), the A is globally (•) , on the contrary A is locally (•).
DEFINITION 16
REMARK 1
The definitions of stability (Definition 13) can be replaced by: the set A is (•) if D(•) is a non-empty domain. REMARK 2
Once again, these definitions can be stated in terms of neighborhoods. The previous construction leads us to proceed as follows: if, for each V(A), one builds the union of Ds (t0 , V(A), A) (which is similar to the Ds (t0 , ε, A)), then one obtains the Liapunov stability domain with respect to t0 of A denoted: Ds (t0 , A) = ∪V (A) Ds (t0 , ε, A). If t0 is the range with the interval J , one obtains the Liapunov stability domain of A with respect to J , denoted Ds (J , A).
2.3.2.3 Attractivity The attractivity property of a set means that solutions asymptotically tend to this set.
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
71
φ(t; t0, x0)
δ(t0)
ε x0
a(
t0
)
t0 + T(t0,x0,ε)
FIGURE 2.10 Attractivity of the set A and its attractivity domain Da (A).
A is attractive with respect to J ⊂ I for (2.10) if: ∀t0 ∈ J , ∃δ(t0 ) > 0 such that ∀x0 ∈ X : ρ(x0 , A) ≤ δ(t0 ) ⇒ limt→∞ ρ(φ(t; t0 , x0 ), A) = 0, i.e., ∀ε > 0, ∃T(t0 , x0 , ε) > 0 : ∀t ≥ t0 + T(t0 , x0 , ε), ρ(φ(t; t0 , x0 ), A) ≤ ε. When J = I = R, A is called attractive. When δ(t0 ) = δ does not depend on t0 and T(t0 , ε, x0 ) = T(ε) does not depend on t0 and x0 , then the attractivity property is said to be uniform.
DEFINITION 17
This concept can be formulated in terms of neighborhoods. For example, for all t0 ∈ J and any V(A) neighborhood of A, there exists W(t0 , V) a neighborhood of A such that, for any trajectory resulting from this neighborhood W(t0 , V) at the moment t0 , there is a time T(t0 , x0 , V) > 0 such that the trajectory evolves in W(t0 , V) without leaving there from the moment t0 + T(t0 , x0 , V) (see Figure 2.10). However, for t0 and V(A), a given neighborhood of A, it is useful to know the largest of these neighborhoods W(t0 , V) which will note Da (t0 , V, A): this led to the concept of attractivity domain, intersection of Da (t0 , V, A) (with respect to the V). DEFINITION 18
For (2.10), Da (t0 , A) is the attractivity domain of A with
respect to t0 if: 1. Da (t0 , A) ⊂ X is a neighborhood of A
0882-Perruquetti-ch02_R2_290705
72
Tools for ODE Analysis 2. For ε > 0, x0 ∈ Da (t0 , ε, A) if and only if: ∃T(t0 , ε) > 0 such that ∀t ≥ t0 + T(t0 , ε), ρ(φ(t; t0 , x0 ), A) ≤ ε Da (J , A) is the attractivity domain of A with respect to J if: 1. ∀t0 ∈ J , Da (t0 , A) exists 2. Da (J , A) = ∪t0 ∈J Da (t0 , A) Da (A) is the attractivity domain of A if: Da (A) = Da (J = R, A).
DEFINITION 19 For (2.10), Dua (J , A) is the uniform attractivity domain of A with respect to J if:
1. Dua (J , A) is a neighborhood of A 2. For ε > 0, x0 ∈ Dua (J , A) if and only if: ∃T(ε) > 0, ∀t0 ∈ J , such that ρ(φ(t; t0 , x0 ), A) ≤ ε, ∀t ≥ t0 + T(ε). Dau (A) is the uniform attractivity domain of A if: Dua (A) = Dua (J = R, A). Let us symbolize schematically by (•) one of the four following qualifiers: attractive with respect to J , attractive, uniformly attractive with respect to J , uniformly attractive. If D(•) (J , A) = X (the state space), then A is globally (•); on the contrary, A is locally (•).
DEFINITION 20
REMARK 3
The definitions of attractivity (Definition 17) can be replaced by: the set A is (•) if the domain D(•) is non-empty. 2.3.2.4 Asymptotic Stability The attractivity property of a set expresses the convergence of the solutions into this set after an infinite time, and this, independently of possible excursions during the transient phase. Stability property expresses the proximity of solutions throughout the evolution, but without guaranteeing convergence. These two properties are thus distinct and complementary. Their combination corresponds to the concept of asymptotic stability. A is asymptotically stable with respect to J ⊂ I if it is Liapunov stable J and attractive with respect to J . When J = I = R, A is known as asymptotically stable. If the properties of stability and attractivity are uniform, then the obtained asymptotic property is known as uniform. The various asymptotic stability domains associated to the aforementioned
DEFINITION 21
0882-Perruquetti-ch02_R2_290705
2.3
Some Characterizations of Behaviors
73
properties are defined as being the intersections of the domains of stability and attractivity. Note that for a nonlinear system, a set can be attractive without being stable, and vice versa. The following example illustrates this independence of the two properties.
Example 5 Consider the following ODE:
x y dx = x 1 − x2 + y 2 − 1− dt 2 x2 + y 2
dy x x 2 2 =y 1− x +y + 1− dt 2 x2 + y 2 The origin (0, 0) is an unstable equilibrium point and the equilibrium (1, 0) is attractive but unstable: the phase portrait is given in Figure 2.11. y
2 1.8 1.6 1.4 1.2 1 0.8 0.6 0.4 0.2
–1
–0.5
0.5 –0.2 –0.4 –0.6 –0.8
–1 FIGURE 2.11 Equilibrium (1, 0) is attractive and unstable.
1
x
0882-Perruquetti-ch02_R2_290705
74
Tools for ODE Analysis
Example 6
The solution to the CP of (2.1) x(0) = x0 is given by (2.12). It is thus easy to check that the equilibrium x = 0 is not attractive (limt→∞ φ(t; 0, x0 ) = limt→∞ (x0 xmax /x0 + e−axmax t (xmax − x0 )) = xmax ) and that the equilibrium x = xmax is asymptotically stable. Indeed, it is attractive (limt→∞ φ(t; 0, x0 ) = xmax ) and stable since:
φ(t; 0, x0 ) − xmax =
xmax (xmax − x0 )e−axmax t x0 + (xmax − x0 )e−axmax t
thus for ε > 0, if |x0 − xmax | < ε, |φ(t; 0, x0 ) − xmax | < xmax |(xmax − x0 )/ (x0 + (xmax − x0 ))| < ε. For this example, we could study asymptotic stability from the analytical expression of the solutions. However, for an ODE (2.10) for which, in general, one cannot get explicit solutions, it is important to have a criterion allowing to study the question of stability without having to calculate the solutions: these are the results of Section 2.4 (the first method of Liapunov) and others based on the used of Liapunov function (the second method of Liapunov [17, 23]).
2.3.2.5 Exponential Stability The notion of exponential stability contains an additional information: the speed of convergence toward the set A. A is exponentially stable with respect to J ⊂ I if: ∀t0 ∈ J , ∃δ(t0 ) > 0, ∃α(δ) > 0, ∃β(δ) ≥ 1 such that ∀x0 ∈ X , ρ(x0 , A) ≤ δ(t0 ) implies:
DEFINITION 22
ρ(φ(t; t0 , x0 ), A) ≤ βρ(x0 , A) exp(−α(t − t0 )),
∀t ≥ t0
(2.26)
When J = I = R, A is called exponentially stable. When δ(t0 ) = δ do not depend on t0 and α(δ) = α, β(δ) = β do not depend on δ, then the stability property is called uniform. α is then called the rate of exponential convergence. Just as for the preceding concepts, one can define the corresponding exponential stability domains. The definition of these domains takes into account the obtained pair (α, β): for example, Due (A, α, β) is the greatest neighborhood of A for which the overevaluation (2.26) holds.
0882-Perruquetti-ch02_R2_290705
2.4
Autonomous Linear Case
2.4
Autonomous Linear Case
2.4.1
75
Formal Computation of Solution
Let us consider the following linear autonomous system: x˙ = Ax,
x ∈ Rn
(2.27)
The solution to the CP associated to (2.27), x(t0 ) = x0 , is explicitly given by: x(t) = exp(A(t − t0 ))x0
(2.28)
x˙ = Ax + b(t),
(2.29)
And for the following: x ∈ Rn
the solution is given by: t exp(−A(v − t0 ))b(v) dv x(t) = exp(A(t − t0 )) x0 +
(2.30)
t0
which, when b is constant, is given by: x(t) = exp(A(t − t0 ))x0 +
t t0
exp A(t − v) dv b
(2.31)
which, when A is nonsingular, reads as: x(t) = exp(A(t − t0 ))x0 + exp A(t − t0 ) − Id A−1 b
(2.32)
Thus, the behaviors of (2.27) and (2.29) are entirely driven by the “contraction” and “expansion”11 of the exponential exp(At). Let us recall that: exp(At) =
∞ (At)i i=0
i!
=
n−1
αi (t)Ai
(2.33)
i=0
11 “Contractions” along the eigenvectors corresponding to the eigenvalues of A with negative real parts and “expansions” along the eigenvectors corresponding to the eigenvalues of A with positive real parts.
0882-Perruquetti-ch02_R2_290705
76
Tools for ODE Analysis
since, from the Cayley–Hamilton Theorem, An is a linear combination of the Ai , 0 ≤ i ≤ (n − 1). There exist various ways to compute the exponential, some of which are recalled below: 1. Rewritting A using its Jordan canonical form: A = PJP−1 , J = diag( J(λi )) 1 0 0 λi 0 ... ... 0 J(λi ) = . .. .. .. . . 1 0
···
0
λi
thus exp(At) = P exp( Jt)P−1 with: exp( Jt) = diag(exp( J(λi )t)) t 1 0 . . . exp( J(λi )t) = exp(λi t) . . .. ..
t2 2! .. .
···
0
0
..
.
t(k−1) (k − 1)! t2 2! t 1
2. Using the Dunford splitting: A = N + D, with nilpotant (N n = 0) N ∞ and D diagonalisable (in C), since exp(At) = i=0 ((N + D)t)i /i! and (N + D)i = ik=0 Cki N i−k Dk . The computation of the exponential is then simplified since N n = 0: this trick is similar to the first one and is sometimes faster. 3. By using the method of the constituting matrices, the matrix f (A) can be given by: f (A) =
r n i −1
f ( j) (λi )Zij
i=1 j=0
where r is the number of distinct eigenvalues of A denoted by λi and ni their multiplicity. Thus, f (A) is written as a linear combination of matrices Zij independent of the function f (which depends only on A); the coefficients of this combination depend, then, on the function f . Thus, one determines Zij using a simple testing function (e.g., x → xk ).
0882-Perruquetti-ch02_R2_290705
2.4
Autonomous Linear Case
77
For (2.29), in the particular case of b constant: x˙ = Ax + b
(2.34)
the equilibrium points satisfy Ax + b = 0. If A is regular, then there is only one equilibrium point given by xe = −A−1 b. If A is singular, then two cases arise: •
There is an infinite number of equilibrium points if rank(A, b) = rank(b), that is, b ∈ image(A) or, if ∃c ∈ Rn : b = Ac. They are then defined by: xe = c + u0 , where u0 ∈ ker(A) (u0 is any eigenvector of A associated to the null eigenvalue).
•
There is no equilibrium if b ∈ / image(A).
2.4.2
Stability Conditions
THEOREM 7
Let A be an n × n-matrix with entries in R, its spectrum being σ (A) = {λi ∈ C, i = 1, . . . , r ≤ n : det(λi Id − A) = 0 and λi = λj for i = j}, and ν(λi ) the smallest integer such that ker(A − λi I)ν(λi )+1 = ker(A − λi I)ν(λi ) . Let b be a constant vector satisfying b ∈ image(A) and xe : Axe + b = 0. 1. If ∃λi ∈ σ (A) : Re(λi ) > 0, then limt→+∞ exp(At) = +∞ and xe is unstable for (2.34). 2. If ∃λi ∈ σ (A) : Re(λi ) = 0 and ν(λi ) > 1, then limt→+∞ exp(At) = +∞ and xe is unstable for (2.34). 3. If Re(λi ) < 0, i = 1, . . . , (r − 1) and Re(λr ) = 0, with ν(λr ) = 1, then
exp(At) < +∞ and xe is stable but non-attractive for (2.34). 4. If ∀λi ∈ σ (A) : Re(λi ) < 0, then limt→+∞ exp(At) = 0 and xe is exponentially stable (thus asymptotically stable) for (2.34). REMARK 4
Since there is no possible confusion due to equilibriums of (2.34) all having the same stability property, one also speaks about the “stability of the system (2.34),” or “of the matrix A.”
Example 7
The equilibrium xe = 0 of (2.27) is unstable for A=
−1 0
0 1
(Case 1)
0882-Perruquetti-ch02_R2_290705
78
Tools for ODE Analysis
and for
0
1
0
0
0
0
0
0
−1
1
A= stable for A=
(Case 2)
(Case 3)
and exponentially stable for A=
0
−1
(Case 4).
Notice that, in the second and third case, A has two null eigenvalues. The conclusion is obtained according to ν(0) which is 2 in the second case and 1 in the third. From this, one deduces the following necessary and sufficient condition for the origin to be asymptotically stable for an autonomous linear system. COROLLARY 1
xe is asymptotically stable for (2.34) ⇔ ∀λi ∈ σ (A) : Re(λi ) < 0. In this case, xe = −A−1 b and the stability is also exponential. COROLLARY 2
i If the characteristic polynomial of A is as follows πA (x) = xn + n−1 i=0 ai x , then a necessary condition of stability of xe for (2.34) is that all ai are positive. Note that a necessary and sufficient condition of asymptotic stability is that πA (x) is Hurwitz, or that the ai satisfies the Routh criterion [13]. Other necessary and sufficient conditions are available in the autonomous linear case: some are based on the Liapunov equation, others relate to only the particular shapes of matrix A: if A = (aij ) with aij ≥ 0 for any i = j, then A is asymptotically stable if and only if the principal minors of −A, that is, the n cascaded determinants of the matrices
(−a11 ), det
−a11
−a12
−a21
−a22
are all positive (Kotelianskii criterion).
, . . . , det(−A)
0882-Perruquetti-ch02_R2_290705
2.5
Behavior Studies: Local Results
79
2.5
Behavior Studies: Local Results
This section deals with nonlinear autonomous systems of the form (2.17), for which the existence and uniqueness of solution to the associated CP is assumed to be I(x0 ) = I = R.
2.5.1
Structural Stability
It is a well-known fact that the real world cannot be reduced to a mathematical model: any modelling activity leads to some incorrect terms or models. This is why a natural question arises regarding for what kind of function p(x) do the solution of (2.17) and that of: dx = gp (x, p(x)), dt
x∈X
(2.35)
look the same. To study this property, called structural stability, we need to introduce some distance over the set of C 1 vector fields, which allows to characterize the closeness of two vector fields, together with the notion of topological equivalence which allows to compare the “resemblance” (likeness) of the solutions. This structural stability property is well known from people in control because it is a kind of robustness. The following definitions are taken from p. 91–140 of [1], p. 38– 42 of [12], p. 305–318 of [15], and p. 93–101 of [22]. 2.5.1.1 Whitney Distance Let g1 and g2 be two C 1 (X ) vector fields. The Whitney distance or distance on S ⊂ X between g1 and g2 , is defined by: ∂ j g (x) ∂ j g (x) 1i 2i ρS1 (g1 ; g2 ) = max sup − : i = 1, . . . , n : j = 0, 1 . j ∂xj x∈S ∂x DEFINITION 23
C1
For g, a C 1 (X ) vector field, one defines an ε-neighborhood of g in the C 1 sense on the set S ⊂ X as the set of all C 1 (X ) vector fields g satisfying ρS1 (g ; g) ≤ ε. 2.5.1.2
Equivalence DEFINITION 24 h is a conjugacy with respect to S ⊂ X between the solutions of (2.17) and (2.35) iff: ∀x0 ∈ S, h[tgp (x0 )] = tg [h(x0 )] holds for all time t ∈ R for which tgp (x0 ) and tg [h(x0 )] live in S.
0882-Perruquetti-ch02_R2_290705
80
Tools for ODE Analysis
This relation just says that the function h maps the orbits of the perturbed system (2.35) onto the orbits of the unperturbed system (2.17). DEFINITION 25 Systems (2.17) and (2.35) are topologically (resp. differentially, linearly) equivalent with respect to S iff there exists h continuous (resp. differentiable, linear) conjugacy with continuous (resp. differentiable, linear) inverse and which maps the solution of (2.17) onto that of (2.35) (within the set S).
Since [h linear] ⇒ [h differentiable] ⇒ [h continuous], the topological equivalence is the weakest notion: [linear equivalence] =⇒ [differentiable equiv.] =⇒ [topological equiv.]
2.5.1.3
Structural Stability
System (2.17) is structurally stable with respect to S if there exist an ε-neighborhood of g in the C 1 sense defined on S ⊂ X , such that, for all vector fields gp from this neighborhood, system (2.35) associated to gp and system (2.17) are topologically equivalent. DEFINITION 26
2.5.2
From Linear Model to Nonlinear Model
This section presents the connections between local behavior of autonomous nonlinear system described by (2.17) and the following linear ODE: dx = Ax, dt
x∈X
(2.36)
under the assumption: X = Rn (H) and ∀x0 initial condition there exist a unique maximal solution defined on I(x0 ) = I = R. The techniques to study local behaviors are based on a fundamental result on structural stability (Section 2.5.2.1), which brings the local study of (2.17) to that of a system like (2.36). This local study is made around critical elements like equilibrium points or closed orbits.
0882-Perruquetti-ch02_R2_290705
2.5
Behavior Studies: Local Results
81
2.5.2.1 Structural Stability Theorem and Consequences When looking at (2.36), one has to partition the spectrum of A (denoted by σ (A)) into three parts: σs (A) = {λ ∈ σ (A) : Re(λ) < 0} σc (A) = {λ ∈ σ (A) : Re(λ) = 0} σ (A) = {λ ∈ σ (A) : Re(λ) > 0} u where the indexes s, c, u mean, respectively, “stable,” “center,” and “unstable.” Then the corresponding generalized eigenvectors of A are used to obtained the following subspaces Es (A), Ec (A), Eu (A), whose dimensions are, respectively, ns , nc , nu with: ns + nc + nu = n Es (A) ⊕ Ec (A) ⊕ Eu (A) = Rn Note that a similar partition is possible when X is n-dimensional manifold, since X is locally the “same” as Rn . When σc (A) = ∅, A is hyperbolic (see Definition 8). Similarly, (2.36) is asymptotically stable if and only if σ (A) = σs (A), σc (A) = σi (A) = ∅; A is then said asymptotically stable or Hurwitz. THEOREM 8 (First Liapunov method)
Let xe be an equilibrium point of (2.17), to which the linearized model (2.36) is associated: 1. σu (A) = σc (A) = ∅ ⇒ xe is asymptotically stable for (2.17) 2. σu (A) = ∅ ⇒ xe is unstable for (2.17) Thus, if the origin is asymptotically stable for the linearized model, then the corresponding equilibrium point is also asymptotically stable for the original nonlinear model. COROLLARY 3
Under Assumption (H), and if A is hyperbolic, then (2.36) is structurally stable. Then A is said to be structurally stable: [A is hyperbolic] ⇔ [A is structurally stable]. Note that Assumption (H) is of prime importance, as example (2.14) shows. A direct consequence is the following (p. 99 of [22]). THEOREM 9
Assume that (H) holds, if (2.17) has an hyperbolic equilibrium point xe , then there exists a neighborhood V(xe ) of xe such that (2.17) is structurally stable within the set V(xe ).
0882-Perruquetti-ch02_R2_290705
82
Tools for ODE Analysis
2.5.2.2
Local Structure of Solution Within a Neighborhood of an Equilibrium Point
For a hyperbolic equilibrium point, the following results gives some insight about the local behavior of the solution of (2.17) around this point. THEOREM 10 (Hartman–Grobman, 1964)
If the jacobian matrix Jg (xe ) = A evaluated at the equilibrium point xe does not have a purely imaginary or null eigenvalue (σc (A) = ∅), then there exists a homeomorphism h defined on V(xe ) a neighborhood of xe , locally mapping the orbits of the linear flow of (2.36) onto those of the nonlinear flow tg of (2.17). Moreover, h preserves the going-through direction on the orbits and can be selected in order to preserve the time parameterization. From the neighborhood V(xe ) on which h is defined, one builds the stable and unstable local manifolds: Wloc s (xe ) = {x ∈ V(xe ) : lim tg (x) = xe and tg (x) ∈ V(xe ), ∀t > 0} t→+∞
Wloc u (xe ) = {x ∈ V(xe ) : lim tg (x) = xe and tg (x) ∈ V(xe ), ∀t > 0} t→−∞
from which one defines stable and unstable manifolds (with respect to xe ): Ws (xe ) = ∪t≥0 tg (Wloc s (xe )) Wu (xe ) = ∪t≤0 tg (Wloc u (xe )) These concepts of stable and unstable manifolds thus exhibit solutions of (2.17) which are respectively “contracting” and ”expanding.” The manifolds Ws (xe ), Wu (xe ) are images by h of the corresponding subspaces on the linearized model: Ws (xe ) = h[Es ( Jg (xe ))], Wu (xe ) = h[Eu ( Jg (xe ))]. THEOREM 11 (Stable manifold)
If (2.17) has a hyperbolic equilibrium point xe , then there exists Ws (xe ) and Wu (xe ): 1. Of dimension ns and nu the same as those of the spaces Es ( Jg (xe )) and Eu ( Jg (xe )) of the linearized system (2.36) (with A = Jg (xe )) 2. Tangents to Es ( Jg (xe )) and Eu ( Jg (xe )) at xe 3. Invariant by the flow tg Moreover, Ws (xe ) and Wu (xe ) are manifolds as smooth as g (of the same class r as g ∈ C r (Rn )).
0882-Perruquetti-ch02_R2_290705
2.5
Behavior Studies: Local Results
83
In the critical case of nonhyperbolic points (or degenerated), the following result holds (see p. 127 of [12]). THEOREM 12 (Center manifold) (Kalley, 1967)
Let g be a C r (Rn ) vector field, admitting a degenerated equilibrium point xe . Let us denote as A = Jg (xe ) its Jacobian matrix evaluated at this point. Then, there exist: 1. Ws (xe ) and Wu (xe ) invariant manifolds called, respectively, stable and unstable of class C r , tangent to Es ( Jg (xe )) and Eu ( Jg (xe )) at xe 2. Wc (xe ) a center manifold of class C (r−1) tangent to Ec ( Jg (xe )) at xe
The manifolds Ws (xe ), Wu (xe ), and Wc (xe ) are all invariant by the flow tg and of the same dimension, as the corresponding subspaces of the linearized system (2.36) (Es ( Jg (xe )), Eu ( Jg (xe )), and Ec ( Jg (xe ))). The stable and unstable manifolds (Ws (xe ) and Wu (xe ), respectively) are unique, whereas Wc (xe ) is not necessarily so. However, it is difficult to obtain these manifolds, even numerically: often, the only recourse for the determination of a center manifold is to use a Taylor enpension of Wc (xe ) in the neighborhood of the degenerated point xe : this method has been known for a long time since A.M. Liapunov used it in 1892 to study the “critical case” [19]. For the sake of simplicity, one carries out a change of coordinates on the initial system (2.17) to come back to the case with the equilibrium point being at the origin. In the most interesting case in practice, Wu (0) is empty. The center manifold theorem ensures that the initial system (2.17) is topologically equivalent to: dx c = Ac xc + g1 (x) dt dxs = As xs + g2 (x) dt with Ac of dimension nc corresponding to that of Ec ( Jg (0)) and which thus has all its eigenvalues with null real part. As is of dimension ns corresponding to that of Es ( Jg (0)), therefore asymptotically stable. One can express Wc (0) as an hypersurface: Wc (0) = {(xc , xs ) ∈ Rnc × Rns : xs = k(xc )} Moreover, one knows that when Wc (0) contains 0 (thus k(0) = 0) and, at this point, is tangential to Ec ( Jg (0)) (thus Jk (0) = 0). One gets: xs = k(xc ) =⇒
dxs dxc = Jk (xc ) dt dt
0882-Perruquetti-ch02_R2_290705
84
Tools for ODE Analysis
thus: As xs + g2 (xc , k(xc )) = Jk (xc )(Ac xc + g1 (xc , k(xc ))) k(0) = 0,
(2.37)
Jk (0) = 0
(2.38)
One studies the projection of the vector field of xs = k(xc ) onto Ec ( Jg (0)): dxc = Ac xc + g1 (xc , k(xc )) dt
(2.39)
taking into account (2.37) and (2.38). This leads to the following theorem (see p. 131 of [12]). THEOREM 13 (Henry and Carr, 1981)
If: 1. Wu (0) is empty 2. the equilibrium xec = 0 of (2.39) is locally asymptotically stable (resp. unstable), then the equilibrium xe of (2.17) is asymptotically stable (resp. unstable). The computation of (2.39) being generally impossible, the following theorem [12] makes possible the study of local stability of the equilibrium xec = 0 by using the approximate of k. THEOREM 14 (Henry and Carr, 1981)
If there exist ψ : Rnc → Rns with ψ(0) = 0 and Jψ (0) = 0, such that, when x → 0: Jψ (xc )[Ac xc + g1 (xc , ψ(xc ))] − As ψ(xc ) − g2 (xc , ψ(xc )) = o(xr ), then h(xc ) = ψ(xc ) + o(xr ), when x → 0.
r>1 (2.40)
This technique allows, in most of the cases, to arrive at a conclusion about the asymptotic stability of a degenerated equilibrium.
Example 8
Let us consider the following ODE (x, y) ∈ R2 : dx = −x2 + xy dt dy = −y + x2 dt
(2.41)
0882-Perruquetti-ch02_R2_290705
2.5
Behavior Studies: Local Results
One gets: Jg (x, y) =
85
−2x + y 2x
x −1
and the system has two equilibrium points: ze1 = ze2 =
0 0
1 1
, degenerated, Jg (ze1 ) =
, unstable, Jg (ze2 ) =
−1 2
0
0
0
−1
1
−1
For the origin, the eigenvalues of the associated jacobian matrix are 0 and −1 (one gets Ac = 0, As = −1). One looks for the center manifold associated to this equilibrium point by his third-order development: k(x) = ax2 + bx3 + o(x3 ), since k(0) = Jk (0) = 0. This development must satisfy (2.40): therefore, [2ax + 3bx2 + o(x2 )][−x2 + (ax3 + bx4 + o(x4 ))] = [(1 − a)x2 − bx3 + o(x3 )] and, by equalizing the terms of the same degree, one obtains a = 1, b = 2, this is: k(x) = x2 + 2x3 + o(x3 ). Thus (2.39) becomes x˙ = −x2 + x3 + o(x3 ) and Theorem 13 makes it possible to conclude with unstability the origin. Notice that the same result can be obtained more intuitively and without too much calculation, by noting that the second dynamics (in y) of (2.41) converges faster (exponentially) than the first one (in x): one can thus consider that after a transient, (dy/dt) = 0 = −y + x2 , (i.e., y = x2 ): one finds the center manifold k(x) = x2 + o(x2 ). This is justified using the singular perturbation theory theorem.
Example 9 Let us consider the following ODE: dx = xy dt dy = −y − x2 dt with (x, y) ∈ R2 . The origin is the only equilibrium point. The eigenvalues of the associated jacobian matrix are 0 and −1. A third-order development of k(x) is −x2 + o(x3 ). Theorem 13 leads to the conclusion that the origin is asymptotically stable (but not exponentially stable).
0882-Perruquetti-ch02_R2_290705
86
Tools for ODE Analysis
REMARK 5
There exists a quick way to deal with these two examples: in the neighborhood of the origin, y converges exponentially, thus “infinitely faster” than x would do it. One deduces from this that dy/dt cancels “infinitely” faster than dx/dt; this is, for Example 8, y = x2 , which deferred in dx/dt = −x2 + y gives the approximate equation dx/dt = −x2 + x3 . In the same way, Example 9, when t → ∞, leads to y → −x2 , therefore dx/dt = −x3 . 2.5.2.3 Local Structure of the Solutions in the Neighborhood of a Closed Orbit To study the local structure of a closed orbit, one introduces the concept of the Poincaré12 section which makes it possible to define an application known as the Poincaré map. The map then brings back the local study of a closed orbit, for a continuous dynamic system, to the local study of a fixed point for a discrete dynamic system.13 This theoretical tool can be used in practice only using numerical algorithms. This process outlined here is based on pp. 243, 281–285 of [15] and p. 23–27 of [12]. Assume that the dynamic system (2.17) has a closed orbit γ (see Definition 10) and let xγ be a point of this orbit. DEFINITION 27
Sγ is a local Poincaré section at xγ of (2.17) if:
1. Sγ is an open of a submanifold V of X having dimension (n − 1) and containing xγ 2. TV(xγ ) tangent space to V at xγ and g(xγ ) ∈ Rn are in direct sum: Rn = TV(xγ ) ⊕ g(xγ )R This last condition expresses the transversality (nontangent) of Sγ and the vector filed g(x) of (2.17) at xγ . Let Sγ be a local Poincaré section (Figure 2.12) at xγ of (2.17): since xγ ∈ γ , one gets Tg (xγ ) = xγ , denoting by Tγ the period of γ . If one considers x0 a point sufficiently close to T(x ) xγ , there exist a time T(x0 ) close to Tγ after which g 0 (x0 ) ∈ Sγ . Let us consider V(xγ ) a neighborhood of xγ and let us build the map known as Poincaré map or the first return map: P : V(xγ ) ∩ Sγ −→ Sγ T(x0 )
x0 → P(x0 ) = g
(x0 )
12 Henri Poincaré (1854–1912), French mathematician and physicist. Entered the Polytechnic School in 1873, and became an engineer from the “coprs des Mines” in 1877. Then he taught at the Faculty of Science of Caen and then at the Sorbonne in 1881. 13 The just seen results concerning the equilibrium points of an ODE (2.17) can be transposed to the fixed points for an discrete equation of recurrence of xk+1 = g(xk ).
0882-Perruquetti-ch02_R2_290705
2.5
Behavior Studies: Local Results
87
γ g(xγ)R xγ
Tγ(xγ)
Sγ
FIGURE 2.12 Poincaré section.
This construction is justified since under some asumptions [e.g., g of class C 1 (Rn )] there exists V(xγ ) and a unique application T : V(xγ ) → R, x0 → T(x ) T(x0 ), such that ∀x0 ∈ V(xγ ) : g 0 (x0 ) ∈ Sγ and T(xγ ) = Tγ . Note that P depends neither on xγ nor on Sγ . P generates a discrete dynamic system and has a fixed point xγ (P(xγ ) = xγ ). Thus, this application brings back the study of the solutions in the neighborhood of a closed orbit of a continuous dynamic system defined on a manifold X of dimension n to the study of the solutions in the neighborhood of a fixed point of a discrete dynamic system defined on a manifold of dimension n − 1: xk+1 = P(xk ) = Pk (x0 ). The local behavior of the solutions of the discrete dynamic system in the neighborhood of the fixed point fixes xγ makes it possible to deduce the behavior of the solutions for the continuous dynamic system (2.17) in the neighborhood of γ . The study of a the local behavior of a discrete dynamic system in a neighborhood of a fixed point is very similar to the study of a continuous dynamic system in a neighborhood of an equilibrium point. In particular, to study the discrete system xk+1 = Axk , one partitions σ (A) into σs (A) = {λ ∈ σ (A) : |λ| < 1}, σc (A) = {λ ∈ σ (A) : |λ| = 1}, σu (A) = {λ ∈ σ (A) : |λ| > 1}. One then obtains similar results to those previously developed, allowing to deduce from it the local structure of the flow in the neighborhood of a closed orbit γ . However, the application P can be obtained explicitly only if the solutions of (2.17) can be explicitly computed: this limits the practical interest of the application P which very often must be evaluated numerically.
0882-Perruquetti-ch02_R2_290705
88
Tools for ODE Analysis
Example 10
Using polar coordinates (x1 = r cos(θ ), x2 = r sin(θ )), ODE (2.13) becomes: dr = r(1 − r2 ) dt θ˙ = 1 r02 (1 − e−2t ) + e−2t , θ (t) = θ0 + t, and straightSolutions are r(t) = r0 forward study shows that any solution starting in the plan except the origin converge to a periodic solution x1 (t) = cos(t + φ), x2 (t) = sin(t + φ). Instead of this direct analysis let us use the Poincaré section x2 = 0, in the neighborhood of (1, 0). One brings back the study to x1k+1 = x1k (x1k )2 (1 − e−4π ) + e−4π whose linearized model is y1k+1 = e−4π y1k . Thus one concludes that the periodic orbit is locally asymptotically stable.
2.6
Bifurcation and Chaos
Nonlinear models can have radical changes of behavior when a parameter evolves: this is a bifurcation phenomenon. For example, the displacement of a mass m attached to a spring of stiffness k and a frame excited by force α x˙ is modeled by m¨x + µ˙x + kx = 0, µ = δ − α, with δ the friction coefficient. The modes, for µ small, are λ = (−µ ± i (4mk − µ2 ))/2m. Obviously, if µ is positive (resp. negative), then bottom equilibrium is unstable (resp. stable), whereas, for µ0 = 0, an oscillatory mode appears. Clearly, µ0 is a bifurcation value. As examples of simple discrete equations,14 one can check that an infinite number of such bifurcations can lead to an unforeseeable behavior due to their high sensitivity to the initial conditions: it is a phenomenon of chaos. This same type of phenomenon appears for autonomous nonlinear ODEs, but only for the dynamic of order equal to or higher than three.
2.6.1
Parameter Dependence
Assume that k parameters, gathered in a vector µ ∈ Rk , appear in the ODE: dx = g(x, µ), dt 14 For example, first-order discrete equation x
x ∈ Rn , µ ∈ Rk n+1 = µxn (1 − xn ) [3, 12].
(2.42)
0882-Perruquetti-ch02_R2_290705
2.6
Bifurcation and Chaos
89
When the vector field g is of class C 1 on open Rn+k , in addition to “the existence, the continuity and the uniqueness of the solutions,” one can note (see Theorem 4) that for a given triplet (t0 , x0 , µ0 ), there are two open neighborhoods of x0 and µ0 noted, respectively, V(x0 ) and V(µ0 ), such that for any pair (x01 , µ01 ) in V(x0 ) × V(µ0 ), the CP: [dx/dt = g(x, µ01 ), x(t0 ) = x01 ] has one and only one maximum solution φ(t; t0 , x01 , µ01 ) of C 1 class with respect to t, x01 , and µ01 . In addition, under the terms of Theorem 6 (since solutions are unique), the equilibrium points of (2.42) are given by the solutions of: g(x, µ) = 0,
x ∈ Rn , µ ∈ R k
Thus, when the vector parameter µ varies, the implicit function theorem shows that these equilibriums xe (µ) are related to µ with the function of the same class as g, provided that there is a equilibrium point (xe , µe ) and that the jacobian matrix evaluated at this point Jg (xe , µe ) = (∂g/∂x)(xe , µe ) is nonsingular: det((∂g/∂x)(xe , µe )) = 0. Under these conditions, there is an open neighborhood of µe , noted V(µe ) and an application h : V(µe ) ⊂ Rk → Rn , µ → h(µ) of the same class as g, such that: g(h(µ), µ) = 0, DEFINITION 28
∀µ ∈ V(µe )
The graph of the function h constitutes branches of
equilibriums.
Example 11
Let us consider the ODE: dx/dt = µ3 − x3 , x ∈ R, µ ∈ R. The branch of equilibriums is the line x = µ. Note that, for any equilibrium (x, µ) = (0, 0), the jacobian matrix of g is nonsingular: in this example, the mapping h is the identity or its opposite according to the sign of xe µe .
Example 12
For the ODE dx/dt = µ − x2 , x ∈ R, µ ∈ R, the branches of equilibriums √ correspond to the graph of the parabola x = ± µ, µ ≥ 0. On the one hand, when (∂g/∂x)(xe , µe ) is nonsingular, the equilibrium points (in a neighborhood of (xe , µe )) are hyperbolic: Theorem 11 can be used to study the local structure of the solutions in the neighborhood of these points (structurally stable system) (Figure 2.13). On the other hand, when (∂g/∂x)(xe , µe ) is singular, one is in the presence of a degenerated point (nonhyperbolic), which results in the possible presence of a change of behavior (junction). Note then that this point can be the junction of several branches of equilibriums (see Example 11). The condition “(∂g/∂x)(xe , µe ) singular” induces a local bifurcation. A general definition of the concept of bifurcation is as follows.
0882-Perruquetti-ch02_R2_290705
90
Tools for ODE Analysis
x 2 1
–1
0
1
2
3
4
m
5
–1
–2 FIGURE 2.13 Branch of equilibrium.
A bifurcation value is a value of the vector parameter µ as in Equation (2.42), for which (2.42) is not structurally stable. In general, one distinguishes two kinds of bifurcations:
DEFINITION 29
1. Local bifurcations: the qualitative changes of the phase portrait appear in the neighborhood of critical elements 2. Global bifurcations: the changes take place on a subspace of the state space, for example, when there is a creation of attractor strange, or when a homoclinic orbit is transformed into periodic orbit or into an equilibrium point
Example 13
µ0 = 0 is a bifurcation value for the ODE of Example 12, but not for that of Example 11 because the equilibrium x = µ is always asymptotically stable whatever be the value of the parameter µ. The graph, in the space (x, µ), of the evolution of the invariants sets (equilibrium points, orbits closed, etc.) with respect to the parameter µ is a bifurcation diagram.
DEFINITION 30
Here, the term “evolution” has to be understood in a qualitative sense, that is, it can be a question of creation or qualitative change (e.g., stable → unstable). Thereafter, the following convention will be adopted: the stable elements will be represented with straight lines and the unstable ones with discontinuous lines.
0882-Perruquetti-ch02_R2_290705
2.6
Bifurcation and Chaos
y
91
2
x
1
–1
0
1
2
3
4
m
5
–1
–2 FIGURE 2.14 Hopf bifurcation of (2.3).
Example 14 Let us consider again the Van der Pol model (see Equation (2.3)). The origin is an equilibrium point and the jacobian matrix at this point is:
0 1 Jg (0) = −1 2µ Thus, for µ near zero, the eigenvalues are µ ± i 1 − µ2 , which means that µ0 = 0 is a bifurcation value for which the origin, while remaining an equilibrium point, qualitatively changes from “asymptotically stable” (µ < 0) to “unstable” (µ > 0). We will see hereafter that it is about a Hopf bifurcation which, when µ becomes positive, gives rise to an asymptotically stable limit cycle surrounding the origin. The bifurcation diagram is given in Figure 2.14.
2.6.2
Local Bifurcation Locale with Codimension 1
It is difficult to make an exhaustive classification of the phenomena of local or global bifurcation. A complex study appears with the increase of: •
The effective dimension of (2.42): n
•
The number of parameters in (2.42): k
However, a great number of phenomena can be studied using “elementary bifurcations” that one often encounters.
0882-Perruquetti-ch02_R2_290705
92
Tools for ODE Analysis
In particular, for the equilibrium points, when the parameters vary, the eigenvalues of the jacobian matrix can cross the imaginary axis: this leads to bifurcation. Among these parameters, a minimal number can be used to reproduce this type of bifurcation: it is the codimension of the bifurcation. For a bifurcation of codimension 1, Jg (0) is similar to either
or
0
ω
0
0
0
X
−ω 0 0
0 Y
with X and Y matrices of respective size (n − 1) × (n − 1) and (n − 2) × (n − 2). Generically, any bifurcation (local in the neighborhood of an equilibrium) of codimension 1 can be reduced to one of the following bifurcation.15 2.6.2.1 Subcritical or Saddle–Node This bifurcation is modeled by: dx = µ − x2 , dt
x ∈ R, µ ∈ R
(2.43)
√ √ The equilibrium points are xe1 = − µ and xe2 = µ. For µ ≥ 0, their √ √ respective jacobians are 2 µ and −2 µ; µ0 = 0 is a bifurcation value. There is creation of two equilibrium points: “xe1 does not exist” (µ < 0) → “exists and is unstable” (µ > 0) and “xe2 does not exist” (µ < 0) → “exists and is asymptotically stable” (µ > 0). When µ = µ0 = 0, (2.43) becomes dx/dt = −x2 , which admits as solutions x(t) = x0 /(1 + (t − t0 )x0 ), which shows that, when x0 is positive, x(t) converges towards zero and that, in the contrary, there is a finite time (t0 − (1/x0 )) for which there is “explosion” (x(t) = ∞). The bifurcation diagram is given in Figure 2.15. Note that the equilibrium points are not true “saddle points” and “nodes,” since it would be necessary for the state space to be of dimension 2. For that it is enough to associate with (2.43) the equation dy/dt = −y, y ∈ R, which gives the bifurcation diagram of Figure 2.16. This bifurcation takes its full name “saddle–node”. 15 For that, one will be able to use the center manifold theorem (Theorem 12): (see [12] for more details).
0882-Perruquetti-ch02_R2_290705
2.6
Bifurcation and Chaos
93
x 2
1
0 1
2
3
4
m
5
–1
–2 FIGURE 2.15 Saddle–node bifurcation of (2.43).
2.6.2.2 Transcritical Bifurcation This bifurcation is modeled by: dx = µx − x2 , dt
x ∈ R, µ ∈ R
(2.44)
The equilibrium points are xe1 = 0 and xe2 = µ. Their respective jacobians are µ and −µ; µ0 = 0 is a bifurcation value. There is exchange of stability x y
2
1
0
1
–1
–2
FIGURE 2.16 Saddle–node bifurcation with y˙ = −y.
2
3
4
m
5
0882-Perruquetti-ch02_R2_290705
94
Tools for ODE Analysis x
3
2
1
–3
–2
–1
1
2
3 m
–1
–2
–3 FIGURE 2.17 Transcritical bifurcation of (2.44).
between the two equilibrium points: “xe1 asymptotically stable” (µ < 0) → “unstable” (µ > 0) and “xe2 unstable” (µ < 0) → “asymptotically stable” (µ > 0). When µ = µ0 = 0, (2.44) becomes dx/dt = −x2 (see earlier for the conclusions). The bifurcation diagram is given in Figure 2.17. 2.6.2.3
Supercritical
One distinguishes “fork bifurcation” and “Hopf bifucation”. The fork bifurcation is modeled by: dx = µx − x3 , dt
x ∈ R, µ ∈ R
(2.45)
A quick study shows that µ0 = 0 is a bifurcation value, for which there is creation of two asymptotically stable equilibrium points and loss of stability for the origin: “xe1 = 0 asymptotically stable” (µ < 0) → “unstable” √ (µ > 0) “xe2 = − µ does not exist” (µ < 0) → “exists and is asymptoti√ cally stable” (µ > 0) and “xe3 = µ does not exist” (µ < 0) → “exists and is asymptotically stable” (µ > 0). When µ 0 = 0, (2.45) becomes dx/dt = −x3 , which admits as solution x(t) = x0 1 + 2(t − t0 )x02 , which shows
0882-Perruquetti-ch02_R2_290705
2.6
Bifurcation and Chaos x
95
2
1
0
1
2
3
4
5
m –1
–2 FIGURE 2.18 Fork bifurcation of (2.45).
that x(t) converges toward zero (the origin is asymptotically stable, not exponentially). The bifurcation diagram is given in Figure 2.18. The Hopf bifurcation corresponds to the presence of two combined complex eigenvalues; it is modeled by: dx = −ωy + x(µ − (x2 + y2 )), dt dy = +ωx + y(µ − (x2 + y2 )), dt
x ∈ R, µ ∈ R y ∈ R, ω = cste
This equation, in polar coordinates, becomes dr/dt = r(µ − r2 ), dθ /dt = ω. These two equations are decoupled, the first corresponds to a fork bifurcation (valid only for r positive). Thus, one deduces from it that µ0 = 0 is a bifurcation value and that there is creation of an asymptotically stable closed orbit and loss of stability for the origin when µ becomes positive: ori√ gin: “asymptotically stable” (µ < 0) → “unstable” (µ > 0), orbit (r = µ): “does not exist” (µ < 0) → “exists and is asymptotically stable” (µ > 0). This leads to the Hopf bifurcation diagram given in Figure 2.14. The mere presence of a parameter in an ODE does not mean the systematic existence of a bifurcation. Indeed, the ODE: dx/dt = µ − x3 , x ∈ R, µ ∈ R has only one equilibrium which is asymptotically stable for any value of µ: there is no bifurcation. 2.6.3
Chaos
A chaotic phenomenon (seemingly random behavior) can be obtained starting from several bifurcation phenomena: period doubling [3, 12, 20],
0882-Perruquetti-ch02_R2_290705
96
Tools for ODE Analysis
bifurcation on the torus (infinity of Hopf bifurcation), intermittency (periodic phenomena alternating with aperiodic phenomena), etc. The presence of a strange attractor is an indicator of chaos: indeed, this implies a great sensitivity of the solutions to the initial conditions (two solutions starting from close initial conditions give rise to trajectories of different natures or different forms). Also, a chaotic phenomenon can be detected by highlighting either an invariant set of “non-integer” size (strange attractor), or a sensitivity to the initial conditions (in particular using the Liapunov exponents). In what follows, one will consider only autonomous nonlinear ODEs of the type (2.17). DEFINITION 31 A set A is strange attractor if A is an attractive invariant set by the flow tg and if any trajectory initialized in A is dense in A.
Example 15 Let us consider the Rössler model: x˙ = −(y + z) y˙ = x + ay z˙ = b − cz + xz
(2.46)
for a = b = 0.2, c = 5.8, one can get the Rössler attractor plotted in Figure 2.19.
z 20 15 10 5 0 –10
–5
–5 y
0
0
5 5
FIGURE 2.19 Rösler attractor.
10
x
0882-Perruquetti-ch02_R2_290705
2.6
Bifurcation and Chaos
97
From a practical point of view, it is very difficult to be able to show that a set A is a strange attractor, in particular to show that any trajectory initialized in A is dense in A. Also, it is natural to turn to numerical methods to make it possible to compute the dimension of an attractor which is a convincing indicator of sound “strangeness.” Consider a cube C containing attractor A, whose dimensions need to be determined. Denoting by n(ε) the number of cubes of edge ε necessary to cover all the points constituting the attractor A, one defines fractal dimension (or capacity) by: df (A) = lim
ε→0
ln(n(ε)) ln(1/ε)
(2.47)
There are many other concepts of dimension: Hausdorff dimension (see p. 285 of [12]), entropy with respect to a measure (p. 286 of [12]), the information dimension (p. 345 of [26], p. 735 of [20]), the dimension of correlation (p. 345 of [26]), the Liapunov dimension (p. 739 of [20]), etc.16 However, in practice, one uses the fractal dimension which, from a numerical point of view, is obtained more easily. Indeed, by taking into account the precision of resolution of the ODE (see pp. 722–726 of [20]), it is enough to plot the curve ln(n(ε)) = f (ln(1/ε)) to obtain df (A). For the Rösler attractor, one obtains df (A) = 2.015 ± 0.005. Note that the strange attractor very often results from a process of “feuilletage”: a set is contracted in certain directions, is dilated in others, and is folded up on itself so that it is invariant (see the construction of the Smale horseshoe pp. 102–116 and 230–235 of [12] and pp. 328–334 of [26]). Thus to detect a strange attractor (thus a chaotic phenomenon), one can use the Liapunov exponents to measure the contractions (if the exponent is negative) and expansions (if the exponents is positive). Note that this characteristic results in a sensitivity to the initial conditions. Consider a ball of ray ε centered at a point x0 ; then, the evolution of the axes of the reference frame ({ei }i=1,...,n ) linked to this point is given by: tg (x0 + εei ), i = 1, . . . , n, allowing to define the ith Liapunov exponent by:
t (x0 + εei ) 1 g Li = lim lim ln (2.48) t→∞ ε→0 t ε 16All these dimensions can be defined starting from a parameterized family of dimension (known as Rényi dimension) defined by
n(ε) q ln 1 i=1 pi lim , q≥0 dq (A) = 1 − q ε→0 ln(1/ε)
where pi is the probability for a point of the attractor to be in the ith box. n(ε) such boxes are needed to cover the whole attractor. Thus, if N is the number of points of the plotted attractor (obtained by simulation) and Ni is the number of points in the ith box, one gets pi = Ni /N.
0882-Perruquetti-ch02_R2_290705
98
Tools for ODE Analysis
Consider a particular trajectory tg (x0 ) and denote by µi (t) the eigenvalues of the monodromy matrix17 of associated linearized model x˙ = g(x). Then, around this trajectory (i.e., z˙ = Jg (tg (x0 ))z = A(t)z), the Liapunov exponents are given by: 1 ln(|µi (t)|) t→∞ t
Li = lim
In particular, if x0 is an equilibrium point, then z˙ = Jg (x0 )z = Az. The monodromy matrix is (t) = exp(At); thus by noting λi the eigenvalues of A (all presumedly real), one obtains Li = limt→∞ (1/t) ln(exp(λi t)) = λi . In general, these Liapunov exponents are reordered as L1 ≥ L2 ≥ · · · ≥ Ln . In this case, for a dissipative system ni=1 Li < 0 and a necessary condition for the appearance of chaos is L1 > 0. For an ODE of dimension 3, a necessary and sufficient condition for the existence of a strange attractor is: L1 < 0, L2 = 0, L3 > 0.
References 1. V.I. Arnold, Chapitres Suplémentaires À la Théorie Des Equations Différentielles Ordinaires, MIR, Moscow, 1980. 2. V.I. Arnold, Equations Différentielles Ordinaires, MIR, Moscow, 1988, 4th ed., Russian translation. 3. P. Berge, Y. Pomeau, and CH. Vidal, L’Ordre Dans Le Chaos (Vers Une Approche Déterministe de la Turbulence), 1984. 4. N.P. Bhatia and G.P. Szegö, Stability Theory of Dynamical Systems, SpringerVerlag, Berlin, 1970. 5. H.D. Chiang, M.W. Hirsch, and F.F. Wu, Stability regions of nonlinear autonomous dynamical systems, IEEE Trans. Autom. Control, 33 (1), 16–27, 1988. 6. H.D. Chiang and J.S. Thorp, Stability regions of nonlinear dynamical systems: a constructive methodology, IEEE Trans. Autom. Control, 34 (12), 1229–1241, 1989. 7. E. Coddington and N. Levinson, Theory of Ordinary Diffrential Equations, McGraw-Hill, 1955. 8. A.F. Filippov, Differential Equations with Discontinuous Righthand Sides, Kluwer Academic Publishers, 1988. 9. R. Genesio and A. Vicino, New techniques for constructing asymptotic stability regions for nonlinear systems, IEEE Trans. Circuits Syst., CAS-31 (6), 574–581, 1984. 17 This matrix is periodic in the case of a periodic trajectory.
0882-Perruquetti-ch02_R2_290705
References
99
10. R. Genesio, M. Tartaglia, and A. Vicino, On estimation of asymptotic stability regions: state of art and new proposals, IEEE Trans. Autom. Control, AC-30 (8), 747–755, 1985. 11. Lj.T. Gruji´c, A.A. Martynyuk, and M. Ribbens-Pavella, Large Scale Systems Stability under Structural and Singular Perturbations, LNCIS, Springer-Verlag, 1987. 12. J. Guckenheimer and P. Holmes, Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields, Springer-Verlag, 1983. 13. W. Hahn, Stability of Motion, Springer-Verlag, N.Y., 1967. 14. J. Hale and H. Koçak, Dynamics and Bifurcations, vol. 3 of Text in Applied Mathematics, Springer-Verlag, N.Y., 1991. 15. M.W. Hirsh and S. Smale, Differential Equations, Dynamical Systems, and Linear Algabra, Academic Press, 1974. 16. A. Isidori, Nonlinear Control Systems, 3rd ed., vol. 1, Springer, 1989. 17. H.K. Khalil, Nonlinear Systems, Prentice-Hall, 1996. 18. V. Lakshmikantham and S. Leela, Differential and Integral Inequalities, vol. 1, Academic Press, New York, 1969. 19. A.M. Liapunov, Stability of motion: general problem, Int. J. Control, 55 (3), Mars 1892 (1992), Lyapunov Centenary Issue. 20. H.-O. Peitgen, H. Jürgens, and D. Saupe, Chaos and Fractals: New Frontiers of Science, Springer-Verlag, 1992. 21. W. Perruquetti, Sur la Stabilité et l’Estimation Des Comportements Non Linéaires, Non Stationnaires, Perturbés, Ph.D. thesis, University of Sciences and Technology of Lille, France, 1994. 22. H. Reinhard, Equations Différentielles, Fondements et Applications, GauthierVillars, 1982. 23. J.P. Richard, Edt., Mathématiques pour les systèmes dynamiques, Collection I2C, Hermes, Lavoisier, 2002. 24. N. Rouche and J. Mawhin, Equations Différentielles Ordinaires, Tome 1: Théorie Générale, Masson et Cie, Paris, 1973. 25. N. Rouche and J. Mawhin, Equations Différentielles Ordinaires, Tome 2: Stabilité et Solutions Périodiques, Masson et Cie, Paris, 1973. 26. R. Seydel, Practical Bifurcation and Stability Analysis: From Equilibrium to Chaos, 2nd ed., vol. 5 of IAM, Springer-Verlag, 1994.
0882-Perruquetti-ch02_R2_290705
0882-Perruquetti-ch03_R2_290705
3 Normal Forms and Bifurcations of Vector Fields
C. Dang Vu-Delcarte
CONTENTS 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Normal Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Local Study of the Center Manifold . . . . . . . . . . . . . . 3.2.2 Normal Form Theorem . . . . . . . . . . . . . . . . . . . . . . . 3.2.3 Use of the Basis of Operators ∂/∂xi . . . . . . . . . . . . . . 3.2.4 Use of Complex Coordinates . . . . . . . . . . . . . . . . . . . 3.2.5 Resonance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Bifurcations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.1 The Hopf Bifurcation . . . . . . . . . . . . . . . . . . . . . . . . 3.3.2 Three-Dimensional Systems . . . . . . . . . . . . . . . . . . . 3.3.2.1 Bifurcation Conditions and Determination of α (νc ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.2.2 Reduction to the Normal Form . . . . . . . . . . . 3.3.2.3 Computation of the Coefficient a1 . . . . . . . . . 3.3.3 The Bifurcation in the Rössler System . . . . . . . . . . . . 3.3.3.1 Reduction to the Normal Form . . . . . . . . . . . 3.3.3.2 Bifurcation Diagram . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1
. . . . . . . . . .
. . . . . . . . . .
101 102 102 103 108 111 115 118 118 123
. . . . . . .
. . . . . . .
124 125 126 129 130 133 136
Introduction
A normal form is the simplest representation of a class of equations featuring a specific bifurcation phenomenon. The normal form is a sufficient 101
0882-Perruquetti-ch03_R2_290705
102
Normal Forms and Bifurcations of Vector Fields
information to understand the dynamical behavior in the neighborhood of a bifurcation. This chapter consists of two parts. In the first part, we describe some of the techniques used to calculate normal forms. The second part deals with applications of the Hopf bifurcation and presents an example of codimension 2 bifurcation.
3.2 3.2.1
Normal Forms Local Study of the Center Manifold
Let x˙ = f (x, µ),
x ∈ Rn+m , µ ∈ Rk , (. ) ≡
d dt
(3.1)
be a system of differential equations depending on the k-dimensional parameter µ. Recall (see Chapter 2) that when f is sufficiently smooth, a fixed point (or equilibrium point) of (3.1) is a point x¯ ∈ Rn+m such that f (¯x, µ) = 0. Suppose that, by an appropriate change of coordinates, the fixed point x¯ has been shifted to the origin. After the transformation, the system of equation reads: x˙ = Ax + f (x, y)
(3.2a)
y˙ = By + g(x, y)
(3.2b)
where x and f are n-vectors and A is an n × n matrix whose eigenvalues have a zero real part; y and g are m-vectors, and B is an m × m matrix whose eigenvalues have a negative real part (for the sake of simplicity, we will omit the parameters in the right hand side of (3.2) and we assume that the linearized system does not have eigenvalues with a positive real part, namely, W u = ∅). In practice, when the Jacobian matrix is diagonalizable (or has Jordan blocks), the dynamical system can be written as in (3.2). This is achieved by using the eigenvector basis. The center manifold, W c , may be locally represented in the neighborhood of x¯ = 0 by: W c (0) = {(x, y) ∈ Rn × Rm |y = h(x), |x| < δ, h(0) = 0, Dh(0) = 0}
(3.3)
where h : Rn → Rm is defined on some neighborhood |x| < δ of the origin. Conditions h(0) = 0 and Dh(0) = 0 imply that W c (0) is tangent to the center eigenspace Ec ≡ (y = 0) at (x, y) = (0, 0).
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
103
Setting y = h(x) in (3.2a), we obtain: x˙ = Ax + f (x, h(x)),
x ∈ Rn , h : Rn → R m
(3.4)
If the fixed point of (3.4) is stable (resp. asymptotically stable), then the fixed point of (3.1) is also stable (resp. asymptotically stable). The nature of the nonhyperbolic fixed point of (3.1) is obtained by looking at the motion on the center manifold. This section describes the theory of normal forms, which uses a coordinate transformation to reduce the system (3.4) to a simpler form containing all the dynamics. The reduced system is called the normal form.
3.2.2
Normal Form Theorem
Let us rewrite (3.4) as: x˙ = Ax + F(x),
with F(x) = f (x, h(x)) x ∈ Rn
(3.5)
Let Hk be the vector space spanned by the following vectors k
k
xk ei ≡ x11 x22 . . . xnkn ei ,
1 ≤ i ≤ n, k1 + k2 + · · · + kn = k
(3.6)
where {e1 , e2 , . . . , en } is the basis of the coordinate system (x1 , x2 , . . . , xn ). Let us now perform a Taylor expansion of (3.5) in n variables about the origin: x˙ = Ax + F(2) (x) + F(3) (x) + · · · + F(k) (x) + O(|x|k+1 ).
(3.7)
F(k) (x) takes the explicit form: (k) (k) (k) T F(k) (x) = F1 , F2 , . . . , Fn (k)
(3.8)
(k)
where F1 , . . . , Fn are homogeneous polynomials of order k in x. Let us set L = Ax. L induces an endomorphism, ad L: Hk → Hk , defined by: ad L(Y) = (DL)Y − (DY)L,
for all Y(x) ∈ Hk
(3.9)
where DL = A. In the system of coordinates (x1 , x2 , . . . , xn ), (3.9) reads: ad L(Y)i =
n ∂Li j=1
∂Yi Yj − Lj ∂xj ∂xj
(3.10)
0882-Perruquetti-ch03_R2_290705
104
Normal Forms and Bifurcations of Vector Fields
with Li = nj=1 Aij xj . Let Gk denote the complementary subspace to ad L(Hk ) in Hk (viz., Hk = ad L(Hk ) ⊕ Gk ). The normal form theorem can now be stated: THEOREM 1
There exists a series of changes of coordinates of the form: x = y + P(y),
P(y) ∈ Hr , r = 2, 3, . . . , k
(3.11)
that transform the system (3.7) into the normal form: y˙ = Ay + g(2) (y) + g(3) (y) + · · · + g(k) (y) + O(|y|k+1 )
(3.12)
where g(i) ∈ Gi , 2 ≤ i ≤ k. This theorem is also known as the Poincaré–Dulac theorem. P(y) is explicitly of the form: P(y) = (P1 , P2 , . . . , Pn )T
(3.13)
where P1 , . . . , Pn are homogeneous polynomials of degree r in y. PROOF The proof consists in the construction of the n-vector P(y) by recurrence. Suppose that we have already performed k − 1 changes of variables, and that Equation (3.7) at step k − 1 reads:
x˙ = Ax + g(2) (x) + g(3) (x) + · · · + g(k−1) (x) + F(k) (x) + O(|x|k+1 )
(3.14)
with g(i) ∈ Gi for 2 ≤ i ≤ k − 1 and F(k) (x) ∈ Hk . Let us introduce the change of coordinates: x = y + P(y),
P(y) ∈ Hk
in (3.14), it follows that: (I + DP(y))˙y = A(y + P(y)) + g(2) (y) + g(3) (y) + · · · + g(k−1) (y) + F(k) (y) + O(|y|k+1 ) Consequently, y˙ = Ay + g(2) (y) + g(3) (y) + · · · + g(k−1) (y) + F(k) (y) + AP(y) − DP(y)Ay + O(|y|k+1 )
(3.15)
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
105
Terms of degree lower than k are not modified by this transformation. The term of degree k reads: F(k) (y) + DL(y)P(y) − DP(y)L(y) ≡ F(k) (y) + ad L(P(y))
(3.16)
where L(y) = Ay, DL = A, and DP = ∂Pi /∂yj . Let us seek the conditions for which (3.16) is zero, namely: ad L(P(y)) = −F(k) (y)
(3.17)
Recall that the two terms of (3.17) are homogeneous polynomials of degree k. Let M(k) denote the matrix (or the representation) of ad L in the vector space Hk . There are thus two possibilities (the Fredholm alternative): •
Either the matrix M(k) is invertible and hence (3.17) completely determines P(y) and F(k) is eliminated
•
Or M(k) is not invertible and hence if Gk denotes the kernel of M(k) , we have F(k) = g(k) + l(k) with g(k) ∈ Gk = Ker M(k) , l(k) ∈ M(k) (Hk ) = Im M(k) , and g(k) cannot be eliminated. In addition, P(y) is not unique.
Example 1 Consider the differential system [10]: x˙ 0 = y˙ 0
1 0
(2) F1 (x, y) x + O(3) + (2) y F (x, y)
(3.18)
2
with (2)
F1 (x, y) = c120 x2 + c111 xy + c102 y2 (2)
F2 (x, y) = c220 x2 + c211 xy + c202 y2 in the canonical basis e1 = The matrix
1 , 0
0 A= 0
e2 =
0 1
1 0
(3.19)
0882-Perruquetti-ch03_R2_290705
106
Normal Forms and Bifurcations of Vector Fields
has the eigenvalues: λ1 = λ2 = 0. The basis of H2 is: 2 2
0 0 xy 0 x y , , 2 , , , 2 0 xy x y 0 0 To compute ad L(H2 ), we calculate the action of ad L on each vector of the basis of H2 . By virtue of (3.9) it follows that if 0 1 x y L= = 0 0 y 0 we have: 2 0 x = 0 0 xy 0 ad L = 0 0 2 0 y ad L = 0 0 0 0 ad L 2 = 0 x 0 0 ad L = xy 0 0 0 ad L 2 = 0 y ad L
2 2x x − 0 0 1 xy y − 0 0 0 2 1 0 y − 0 0 0 0 1 0 − 0 2x x2 1 0 0 − 0 xy y 0 1 0 − 0 0 y2
1 0
0 y xy = −2 0 0 0 2 x y y =− 0 0 0 2y y 0 = 0 0 0 2 0 y x = 0 0 −2xy xy 0 y = x 0 −y2 2 0 y y = 2y 0 0
Thus, we obtain a basis of ad L(H2 ): 2 2
xy xy y x , , , 0 −y2 0 −2xy so that dim ad L(H2 ) = 4. Since dim H2 = 6 and H2 = ad L(H2 ) ⊕ G2 , we get dim G2 = 2. However, the choice of a basis for G2 is not unique. In fact, we can rewrite the transformation (3.11) in the form: x u P1 (u, v) = (3.20) + y P2 (u, v) v with P1 (u, v) = α20 u2 + α11 uv + α02 v2 P2 (u, v) = β20 u2 + β11 uv + β02 v2
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
107
The left-hand side in (3.16) reads:
(c120 + β20 )u2 + (c111 + β11 − 2α20 )uv + (c102 + β02 − α11 )v2 c220 u2 + (c211 − 2β20 )uv + (c202 − β11 )v2
(3.21)
Note that (3.21) cannot be completely eliminated. We can only reduce the expression to its simplest form. •
If we choose: 2β20 = c211 ,
β11 = c202 ,
β11 − 2α20 = −c111 ,
β02 − α11 = −c102
(3.12) yields (for k = 2): u˙ = v +
1 c211 + c120 u2 + O(3), 2
v˙ = c220 u2 + O(3)
This is the Takens normal form [9]. In this case, the basis of G2 is: 2
0 x , 2 x 0 •
If we choose: β20 = −c120 ,
β11 = c202 ,
β11 − 2α20 = −c111 ,
β02 − α11 = −c102
(3.12) yields (for k = 2): u˙ = v + O(3),
v˙ = c220 u2 + (c211 + 2c120 )uv + O(3)
This is the Bogdanov normal form [1]. In this case, the basis of G2 is:
0 0 , xy x2
In both cases, the transformation (3.20) is not unique since β02 and α02 are arbitrary. REMARK 1
Note that the change of coordinates x1 =
y1 , 2a
x2 =
y2 y2 − 1 2a 4a
0882-Perruquetti-ch03_R2_290705
108
Normal Forms and Bifurcations of Vector Fields
transforms a Takens normal form: x˙ 1 = x2 + ax12 + O(|x|3 ),
x˙ 2 = bx12 + O(|x|3 )
into the Bogdanov form: y˙ 2 =
y˙ 1 = y2 + O(|y|3 ),
3.2.3
b 2 y + y1 y2 + O(|y|3 ) 2a 1
Use of the Basis of Operators ∂/∂x i
The center manifold, W c , is a differentiable manifold of class Cr , r > 1 and dimension n. Its tangent space at a point x ∈ W c will be spanned by the canonical basis [8]: ∂ ei ≡ , i = 1, 2, . . . , n ∂xi In this basis, a (tangent) vector x reads: x=
n i=1
xi
∂ ∂xi
and (3.9) yields: ad L(Y) =
n n ∂Li i=1 j=1
Yj −
∂xj
∂Yi Lj ∂xj
∂ ∂xi
for all Y ∈ Hk
(3.22)
The use of this notation is illustrated with the following example.
Example 2 Consider the following differential system [4]: x˙ 0 = y˙ ω
−ω 0
In this case:
A=
and
x F1 (x, y) + F2 (x, y) y
0 ω
−ω 0
(3.23)
∂ ∂ +x L = ω −y ∂x ∂y
(3.24)
(3.25)
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
109
The eigenvalues of A are: λ1,2 = ±iω. The action of ad L on a vector Y = Y1
∂ ∂ + Y2 ∂x ∂y
belonging to Hk yields, using (3.22): ∂Y1 ∂ ∂Y1 −x ad L(Y) = ω −Y2 + y ∂x ∂y ∂x ∂Y2 ∂ ∂Y2 + ω Y1 + y −x ∂x ∂y ∂y
(3.26)
The vector space H2 has the basis: x2
∂ ∂ ∂ ∂ ∂ ∂ , xy , y2 , x2 , xy , y2 ∂x ∂x ∂x ∂y ∂y ∂y
(3.27)
The action of ad L on these vectors yields, using (3.26): ∂ ∂ ∂ + ωx2 = 2ωxy ad L x ∂x ∂x ∂y ∂ ∂ ∂ + ωxy ad L xy = ω(y2 − x2 ) ∂x ∂x ∂y ∂ ∂ ∂ ad L y2 + ωy2 = −2ωxy ∂x ∂x ∂y ∂ ∂ ∂ ad L x2 + 2ωxy = −ωx2 ∂y ∂x ∂y ∂ ∂ ∂ + ω(y2 − x2 ) ad L xy = −ωxy ∂y ∂x ∂y ∂ ∂ ∂ ad L y2 − 2ωxy = −ωy2 ∂y ∂x ∂y
2
The resulting six vectors are linearly independent, since the matrix of ad L in the basis (3.27): 0 −1 0 −1 0 0 2 0 −2 0 −1 0 0 1 0 0 0 −1 (2) M = ω 0 0 0 −1 0 1 0 1 0 2 0 −2 0 0 1 0 1 0
0882-Perruquetti-ch03_R2_290705
110
Normal Forms and Bifurcations of Vector Fields
is nonsingular (its determinant is equal to 9ω6 ). We thus have ad L(H2 ) = H2 and G2 = {0}. There is consequently no term of degree 2 in the normal form of (3.23). Let us now seek the terms of degree 3. The vector space H3 has the basis:
∂ ∂ ∂ ∂ ∂ ∂ ∂ ∂ x3 , x2 y , xy2 , y3 , x3 , x2 y , xy2 , y3 (3.28) ∂x ∂x ∂x ∂x ∂y ∂y ∂y ∂y Using (3.26) it follows that ∂ ∂ 3 ∂ ad L x + ωx3 ≡ s1 = 3ωx2 y ∂x ∂x ∂y ∂ ∂ 2 ∂ + ωx2 y ≡ s2 ad L x y = ω(2xy2 − x3 ) ∂x ∂x ∂y ∂ ∂ ∂ + ωxy2 ≡ s3 ad L xy2 = ω(y3 − 2x2 y) ∂x ∂x ∂y ∂ ∂ ∂ ad L y3 + ωy3 ≡ s4 = −3ωxy2 ∂x ∂x ∂y ∂ ∂ ∂ + 3ωx2 y ≡ s5 ad L x3 = −ωx3 ∂y ∂x ∂y ∂ ∂ 2 ∂ + ω(2xy2 − x3 ) ≡ s6 ad L x y = −ωx2 y ∂y ∂x ∂y ∂ ∂ 2 ∂ ad L xy + ω(y3 − 2x2 y) ≡ s7 = −ωxy2 ∂y ∂x ∂y ∂ ∂ 3 ∂ − 3ωxy2 ≡ s8 ad L y = −ωy3 ∂y ∂x ∂y The matrix of ad L in the basis (3.28) is hence: 0 −1 0 0 −1 3 0 −2 0 0 0 2 0 −3 0 0 0 1 0 0 (3) M = ω 1 0 0 0 0 0 1 0 0 3 0 0 1 0 0 0 0 0 1 0
0 −1 0 0 −1 0 2 0
0 0 −1 0 0 −2 0 1
0 0 0 −1 0 0 −3 0
An elementary calculation leads to the conclusion that s6 = −s1 − s3 − s8 , s7 = s2 + s4 − s5 , and {s1 , s2 , s3 , s4 , s5 , s8 } are linearly independent. The complementary space G3 is thus of dimension 2. As we have seen in the
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
111
previous example, the choice of a basis of G3 is not unique. If we choose the following vectors to make up a basis of G3 :
∂ ∂ +y (x + y ) x , ∂x ∂y 2
2
∂ ∂ +x (x + y ) −y ∂x ∂y 2
2
(3.29)
the system (3.23) has the normal form: u˙ = −ωv + (a1 u − b1 v)(u2 + v2 ) + O(5) v˙ = ωu + (a1 v + b1 u)(u2 + v2 ) + O(5)
(3.30)
or, in polar coordinates u = r cos θ, v = r sin θ, r˙ = a1 r3 + O(5) θ˙ = ω + b1 r2 + O(4) This is the normal form of the Hopf bifurcation. The choice of the basis (3.29) is justified by the fact that the operator L of (3.25) is invariant with respect to the rotation group, and that the vectors constituting the basis (3.29) share the same property.
3.2.4
Use of Complex Coordinates
The previous computation is simpler if we resort to complex coordinates. Let us set: z = x + iy,
z¯ = x − iy
(3.31)
The inverse transformation of (3.31) is: x=
1 (z + z¯ ), 2
y=
1 (z − z¯ ) 2i
Equation (3.23) may now be rewritten in the form z˙ = iωz + F(z, z¯ ),
¯ z¯ ) z˙¯ = −iω¯z + F(z,
(3.32)
With respect to the variables z, z¯ , the canonical basis of the tangent space Ec is:
1 ∂ ∂ 1 ∂ ∂ ∂ ∂ ∂ ∂ , = −i = +i , with ; ∂z ∂ z¯ ∂z 2 ∂x ∂y ∂ z¯ 2 ∂x ∂y
0882-Perruquetti-ch03_R2_290705
112
Normal Forms and Bifurcations of Vector Fields
We have:
A=
iω 0
0 −iω
and L = iω
∂ ∂ − ∂z ∂ z¯
(3.33)
The action of L on a vector Y = Y1
∂ ∂ + Y2 ∂z ∂ z¯
belonging to Hk yields, using (3.22): ∂Y1 ∂ ∂Y1 ad L(Y) = iω Y1 − z + z¯ ∂z ∂ z¯ ∂z ∂Y2 ∂ ∂Y2 − iω Y2 + z − z¯ ∂z ∂ z¯ ∂ z¯
(3.34)
The vector space H2 has the basis: z2
∂ ∂ ∂ ∂ ∂ ∂ , z¯z , z¯ 2 , z2 , z¯z , z¯ 2 ∂z ∂z ∂z ∂ z¯ ∂ z¯ ∂ z¯
(3.35)
With respect to the basis (3.35), the matrix of ad L will be diagonal. In fact, using (3.34) we have ∂ ∂ ∂ ∂ = −iωz2 , ad L z¯z = iωz¯z ad L z2 ∂z ∂z ∂z ∂z ∂ ∂ ∂ ∂ ad L z¯ 2 = 3iω¯z2 , ad L z2 = −3iωz2 ∂z ∂z ∂ z¯ ∂ z¯ ∂ ∂ ∂ ∂ ad L z¯z = −iωz¯z , ad L z¯ 2 = iω¯z2 ∂ z¯ ∂ z¯ ∂ z¯ ∂ z¯ It follows that the matrix of ad L in H2 yields:
M(2)
−1 0 0 = iω 0 0 0
0 1 0 0 0 0
0 0 3 0 0 0
0 0 0 −3 0 0
0 0 0 0 −1 0
0 0 0 0 0 1
and that det M(2) = 9ω6 , as in the case of the real variables. Consequently, the terms of degree 2 in (3.32) may be eliminated.
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
113
The vector space H3 has the basis:
3 ∂ 2 ∂ 2 ∂ 3 ∂ 3 ∂ 2 ∂ 2 ∂ 3 ∂ , z z¯ , z¯z , z¯ ,z , z z¯ , z¯z , z¯ z ∂z ∂z ∂z ∂z ∂ z¯ ∂ z¯ ∂ z¯ ∂ z¯ The action of ad L on these vector is, according to (3.34), 3 ∂ 3 ∂ 2 ∂ ad L z , ad L z z¯ = −2iωz =0 ∂z ∂z ∂z ∂ 2 ∂ 2 ∂ 3 ∂ , ad L z¯ ad L z¯z = 2iω¯z = 4iω¯z3 ∂z ∂z ∂z ∂z ∂ ∂ ∂ ∂ ad L z3 = −4iωz3 , ad L z2 z¯ = −2iωz2 z¯ ∂ z¯ ∂ z¯ ∂ z¯ ∂ z¯ ∂ ∂ ∂ ad L z¯z2 = 0, ad L z¯ 3 = 2iω¯z3 ∂z ∂z ∂z We immediately remark that the matrix M(3) −2 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 4 0 (3) M = iω 0 0 0 0 −4 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 −2 0 0
0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 2
is not invertible and that G3 ≡ Ker M(3) is of dimension 2 and is spanned by the following vectors
∂ ∂ z2 z¯ , z¯z2 ∂z ∂ z¯ More generally, it follows from (3.34) that: ∂ ∂ ad L zk z¯ l = iω(1 − k + l)zk z¯ l ∂z ∂z ∂ ∂ ad L zk z¯ l = −iω(1 + k − l)zk z¯ l ∂ z¯ ∂ z¯ Therefore, we have: ad L z
z¯
l+1 l
∂ ∂z
= ad L z z¯
l l+1
∂ ∂ z¯
=0
0882-Perruquetti-ch03_R2_290705
114
Normal Forms and Bifurcations of Vector Fields
and the matrix M(2l+1) will be noninvertible. G2l+1 = Ker M(2l+1) is spanned by the following vectors
l+1 l ∂ l l+1 ∂ , z z¯ z z¯ ∂z ∂ z¯ Consequently, there exists a transformation: z = ξ + χ (ξ , ξ¯ ),
degree χ (ξ , ξ¯ ) > 1
converting (3.32) into ξ˙ = λξ + c1 ξ 2 ξ¯ + c2 ξ 3 ξ¯ 2 + · · · + cl ξ l+1 ξ¯ l + · · ·
(3.36)
where λ = iω. At the third order, (3.36) is identical to (3.30) with ξ = u + iv, c1 = a1 + ib1 . The normal form (3.36) is known as the Poincaré normal form and plays a fundamental role in the analysis of the Hopf bifurcation (see Section 3.3.1).
Example 3 Consider the system: dx = y, dt
dy = −x2 y − x dt
(3.37)
(Van der Pol equation with ε = 0) [6]. This system has the form (3.23) with ω = −1. Setting z = x + iy, (3.37) yields dz z3 + z2 z¯ − z¯z2 − z¯ 3 = −iz − dt 8
(3.38)
To reduce (3.38) to the normal form (3.36), we perform a change of variables of the form: z = ξ + αξ 3 + βξ 2 ξ¯ + γ ξ ξ¯ 2 + δ ξ¯ 3
(3.39)
Replacing (3.39) in (3.38) and neglecting the terms of order ≥4, we get:
dξ dξ¯ + βξ 2 + 2γ ξ ξ¯ + 3δ ξ¯ 2 1 + 3αξ 2 + 2βξ ξ¯ + γ ξ¯ 2 dt dt = −i ξ + αξ 3 + βξ 2 + ξ¯ + γ ξ ξ¯ 2 + δ ξ¯ 3 −
ξ 3 + ξ 2 ξ¯ − ξ ξ¯ 2 − ξ¯ 3 . 8
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
115
Having neglected the terms of order greater than four, one can simply replace dξ¯ /dt with iξ¯ and isolate dξ/dt by multiplying both terms of the equation by 1 − (3αξ 2 + 2βξ ξ¯ + γ ξ¯ 2 ). It follows that: dξ 1 3 1 2 = −iξ + 2α − ξ − ξ ξ¯ dt 8 8 1 3 1 2 ¯ ξ¯ − 2γ − ξ ξ − 4δ − 8 8 As expected, the term in ξ 2 ξ¯ cannot be eliminated. Nevertheless, we can choose α = γ = 2δ = 1/16 in order to eliminate the other terms: dξ 1 = −iξ − |ξ |2 ξ dt 8 The change of variables (3.39) is not unique since β remains arbitrary.
3.2.5
Resonance
We now examine the procedure used to find the normal form of a system of differential equations through the eigenvalues of the Jacobian matrix. We start with a system of differential equations dx = f (x), dt
x ∈ Rn , f : Rn −→ Rn
(3.40)
which has an equilibrium at 0. Let A be the Jacobian matrix of (3.40) at x = 0. Suppose that the matrix A has n distinct eigenvalues and let ei be the eigenvectors corresponding to the eigenvalues λi , i = 1, 2, . . . , n. In addition, suppose that a (linear) coordinate transformation has been performed so that (x1 , x2 , . . . , xn ) are the coordinates with respect to the eigenbasis (e1 , e2 , . . . , en ). The matrix A is thus diagonal in this basis. The matrix of ad L in Hk will also be diagonal, and its eigevectors are xk ei where we have set (see (3.6)): k
k
xk = x11 x22 . . . xnkn ,
with k1 + k2 + · · · + kn = k ≥ 2
(3.41)
Indeed, (3.9) gives: ad L(xk ei ) = (DL)xk ei − D(xk ei )L but D(xk ei )Ax =
kj x k j
xj
λj x j ei =
j
kj λ j x k e i
(3.42)
0882-Perruquetti-ch03_R2_290705
116
Normal Forms and Bifurcations of Vector Fields
and Axk ei = λi xk ei ; so that, according to (3.42): ad L(xk ei ) = λi −
n
kj λ j x k e i
(3.43)
j=1
xk ei is thusan eigenvector of ad L in Hk corresponding to the eigenvalue λi − nj=1 kj λj . If every eigenvalue of ad L in Hk is non-zero, ad L is invertible and Gk = Ker (ad L) = {0}. The eigenvalues λ1 , λ2 , . . . , λn are said to be resonant of order k if there exists an eigenvalue λi such that:
DEFINITION 1
λi =
n
k j λj ,
j=1
n
kj = k ≥ 2,
kj ≥ 0
(3.44)
j=1
Relation (3.44) is equivalent to λi = (k, λ). If (3.44) is satisfied, the terms in (3.41) are called resonant terms: they cannot be eliminated.
Example 4
The matrix A in (3.24) has eigenvalues λ = iω, λ¯ = −iω. In the basis of eigenvectors 1 1 1 1 e1 = , e2 = 2 −i 2 i A takes the form: P−1 AP =
iω 0
0 −iω
with P =
1 2
1 −i
1 i
and the variables, in the eigenvector basis, are z, z¯ (with z = x + iy, z¯ = x − iy). There are resonances of order 2l + 1, l ≥ 1, since we can write: λ = (l + 1)λ + lλ¯ or, taking the complex conjugate, λ¯ = (l + 1)λ¯ + lλ There are no resonances of order 2l. Therefore, for an appropriate change of variables: z = ξ + χ (ξ , ξ¯ ),
degree χ (ξ , ξ¯ ) > 1
0882-Perruquetti-ch03_R2_290705
3.2
Normal Forms
117
the normal form will read: ξ˙ = λξ + c1 ξ 2 ξ¯ + c2 ξ 3 ξ¯ 2 + · · · + cl ξ l+1 ξ¯ l + · · · and we encounter once again the Poincaré normal form (see (3.36)).
Example 5 Consider the Lorenz system: dx = −σ x + σ y dt dy = −xz + rx − y dt dz = xy − bz dt
(3.45)
The system has a couple of nontrivial fixed points x∗ = y∗ = ± b(r − 1),
z∗ = r − 1
The Hopf bifurcation takes place at (see Section 3.3.1) r = rc =
σ (σ + b + 3) σ −b−1
Perform the following change of variables: u = x − x∗ ,
v = y − y∗ ,
w = z − z∗
to shift the fixed point to the origin. We obtain the system: −σ σ u˙ v˙ = 1 −1 ˙ y∗ x∗ w x∗ = ± b(rc − 1)
0 u 0 −x∗ v + −uw , uv −b w
The eigenvalues of the matrix in (3.46) are given by (see (3.87)) λ1,2 = ±iω0 ,
with ω0 =
b(rc + σ ) and λ3 = −(σ + b + 1)
The resonances λi = k1 λ1 + k2 λ2 + k3 λ3 ≡ (k, λ)
(3.46)
0882-Perruquetti-ch03_R2_290705
118
Normal Forms and Bifurcations of Vector Fields
are: •
For i = 1: (k1 , k2 , k3 ) = (n + 1, n, 0)
•
For i = 2: (k1 , k2 , k3 ) = (n, n + 1, 0) For i = 3: (k1 , k2 , k3 ) = (n, n, 1) n = 1, 2, 3, . . .
•
The normal form of the Lorenz system at r = rc is hence: y˙ 1 = λ1 y1 + c1 y2 y12 + · · · + cn y2n y1n+1 ,
y2 = y¯ 1 ,
y˙ 3 = λ3 y3 + d1 (y1 y2 )y3 + · · · + dn (y1 y2 )n y3
(3.47)
where cn ∈ C, dn ∈ R. In the next section (see Example 6) we will establish how the Lorenz system (3.46) can be taken to its normal form (3.47). From the normal form theorem, Theorem 2 follows. THEOREM 2
If the eigenvalues of A are nonresonant then, the equation x˙ = Ax + F(x),
degree F(x) > 1
(3.48)
may be reduced to a linear equation y˙ = Ay, through a change of variables x = y + P(y)
3.3
Bifurcations
In this section, as applications of the normal forms theory, we consider the Hopf bifurcation and the bifurcation of the Rössler system.
3.3.1 The Hopf Bifurcation Suppose that the dynamical system governed by the equation u˙ = f (u, ν),
u ∈ Rn ,
ν: real parameter
has an equilibrium point u = u∗ (ν) and that
(3.49)
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
119
(H): the Jacobian matrix ∂fi A(ν) = ∂u j u=u∗ has a couple of complex conjugate eigenvalues λ1 and λ2 , λ1,2 (ν) = α(ν) ± iω(ν) such that: 1. For a certain value ν = νc α(νc ) = 0
and
d α(ν) = 0 dν ν=νc
2. The n − 2 remaining eigenvalues of A(νc ) have a strictly negative real part. At the point u = u∗ (νc ), we have a two-dimensional center manifold and a stable manifold of dimension n − 2. Perform a coordinate transformation so that (3.49) can be written in the form (3.2). We start by replacing u −→ u∗ + u,
ν = νc + µ
(3.50)
in (3.49) so that the fixed point is shifted to the origin, and so that the value νc is shifted to 0. Equation (3.49) may now be written in the form: ˆ µ) u˙ = A(µ)u + F(u,
(3.51)
ˆ µ) is the nonlinear term. where F(u, Let v1 (µ) (resp. v2 (µ) = v¯ 1 ) be the eigenvector of A(µ) corresponding to the eigenvalue λ1 (µ) = α(µ) + iω(µ) (resp. λ2 (µ) = α(µ) − iω(µ)). Consider the following basis {e1 , e2 , . . . , en } where e1 = v1 , e2 = − v1 , and {e3 , . . . , en } is a real basis of the union of the eigenspaces of λ3 , . . . , λn . Let T be the transformation matrix whose columns are {e1 , e2 , . . . , en }: T = [e1 e2 . . . en ]
(3.52)
Replacing the change of variables, x = T −1 u
(3.53)
x˙ = A (µ)x + F(x, µ)
(3.54)
u = Tx, in (3.51), we get:
0882-Perruquetti-ch03_R2_290705
120
Normal Forms and Bifurcations of Vector Fields
with
α(µ) A (µ) = T −1 A(µ)T = ω(µ) 0
−ω(µ) α(µ) 0
0 0 B(µ)
(3.55)
where B(µ) is an (n − 2) × (n − 2) matrix and ˆ µ) F(x, µ) = T −1 F(Tx,
(3.56)
Let us set: z = x1 + ix2 ,
(3.57)
y = (x3 , x4 , . . . , xn )T Hence, (3.54) reads: z˙ = λ(µ)z + G(z, z¯ , y, µ),
λ(µ) = α(µ) + iω(µ)
y˙ = B(µ)y + H(z, z¯ , y)
(3.58) (3.59)
where we have set G(z, z¯ , y, µ) = F1 (x1 , x2 , y, µ) + iF2 (x1 , x2 , y, µ)
(3.60)
y = w(z, z¯ )
(3.61)
Let
be the center manifold equation; then, the next step in the procedure is to transform (3.58) into its Poincaré normal form (3.36): ξ˙ = λ(µ)ξ + c1 (µ)ξ¯ ξ 2 + · · · + ck (µ)ξ¯ k ξ k+1 + · · · ,
ck (µ) ∈ C
(3.62)
by means of a transformation of the type: z = ξ + χ (ξ , ξ¯ ) Equation (3.62) in polar coordinates (ξ = r eiθ ), reads: r˙ = r[α(µ) + a1 r2 + · · · ] θ˙ = ω(µ) + b1 r2 + · · ·
(3.63)
where we have set: ai = ci and bi = ci . At first order, we have ω(µ) = ω(0) + · · · and α(µ) = α (0)µ + · · · . It follows that r = const. if α (0)µ + a1 r2 = 0, and thus we have the following theorem [5, 7].
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
121
THEOREM 3
If hypotheses (H) are satisfied and if a1 = 0, α (0)µ/a1 < 0, then the fixed point u∗ (νc ) bifurcates into a limit cycle of radius α (0)µ d r≈ − (3.64) , ( ) = a1 dµ and of period T ≈ 2π/ω0 with ω0 = ω(0). Let us set: δ=−
a1 α (0)
(3.65)
Since r must be a positive real value, (3.64) shows that the periodic orbits appear (or the direction of the bifurcation is) on the side µ < 0 if δ < 0 and that the periodic orbits appear (or the direction of the bifurcation is) on the side µ > 0 if δ > 0. If a1 = 0, we must perform an expansion of order >1. It follows from (3.63) that at first order we have dr r = [α (0)µ + a1 r2 ] + · · · dθ ω0
(3.66)
and hence the stability of the fixed point is determined by the sign of α (0)µ. There are now four possibilities [10]: •
Case 1: α (νc ) > 0 and a1 > 0. In this case, the origin is an unstable fixed point if µ > 0 and an asymptotically stable fixed point if µ < 0, with an unstable periodic orbit if µ < 0 (there is no periodic orbit if µ > 0) (see Figure 3.1a).
•
Case 2: α (νc ) > 0 and a1 < 0. In this case, the origin is an asymptotically stable fixed point if µ < 0 and an unstable fixed point if µ > 0, with an asymptotically stable periodic orbit if µ > 0 (there is no periodic orbit if µ < 0) (see Figure 3.1b).
•
Case 3: α (νc ) < 0 and a1 > 0. In this case, the origin is an unstable fixed point if µ < 0 and an asymptotically stable fixed point if µ > 0, with an unstable periodic orbit if µ > 0 (there is no periodic orbit if µ < 0) (see Figure 3.1c).
•
Case 4: α (νc ) < 0 and a1 < 0. In this case, the origin is an asymptotically stable fixed point if µ > 0 and an unstable fixed point if µ < 0, with an asymptotically stable periodic orbit if µ < 0 (there is no periodic orbit if µ > 0) (see Figure 3.1d).
Take for instance Case 4 with µ < 0. For a small enough µ, consider the annulus A defined by (see Figure 3.2): A = {(r, θ )|r1 ≤ r ≤ r2 }
0882-Perruquetti-ch03_R2_290705
122
Normal Forms and Bifurcations of Vector Fields r
r
m
m
(b)
(a)
r
r
m
m
(d)
(c) FIGURE 3.1 Hopf bifurcation diagrams.
r2
A
r1
FIGURE 3.2 The Poincaré–Bendixson annulus.
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
123
r
m
FIGURE 3.3 α (νc ) < 0 and a1 < 0.
where r1 and r2 are chosen so that 0 < r1 <
−α (0)µ < r2 a1
We can easily check that the right-hand side in (3.66) is positive when r = r1 and negative for r = r2 . It follows that, along the boundary of A, the vector field is directed everywhere inward; so, by virtue of the Poincaré– Bendixson theorem, A contains a stable periodic orbit. The remaining cases are proved likewise. It follows that if a1 < 0 (resp. a1 > 0), the periodic orbit will be asymptotically stable (resp. unstable) and the Hopf bifurcation is said to be supercritical (resp. subcritical). The coefficient a1 is called a Liapunov number [10].
3.3.2 Three-Dimensional Systems Consider a three dimensional system depending on a single parameter u˙ = f (u, ν),
u ∈ R3
(3.67)
where, for the sake of simplicity, we have assumed that the fixed point has been shifted to the origin (by a suitable coordinate transformation). We may thus write (3.67) in the form: ˆ ν) u˙ = A(ν)u + F(u,
∂fi with A(ν) ≡ aij (ν) = ∂u j u=0
(3.68)
0882-Perruquetti-ch03_R2_290705
124
Normal Forms and Bifurcations of Vector Fields
3.3.2.1
Bifurcation Conditions and Determination of α (νc )
The characteristic equation of the matrix A reads: |aij (ν) − λδij | = 0 or λ3 + P(ν)λ2 + Q(ν)λ + R(ν) = 0
(3.69)
with P(ν) = −Tr A = −
3
aii (ν)
i=1
a (ν) Q(ν) = Tr A = 11 a21 (ν) c
a12 (ν) a11 (ν) + a22 (ν) a31 (ν)
a13 (ν) a22 (ν) + a33 (ν) a32 (ν)
a23 (ν) a33 (ν)
R(ν) = −det |aij (ν)| Suppose that (3.69) has a couple of complex conjugate roots λ1,2 (ν) = α(ν) ± iω(ν) and a real root λ3 (ν) such that, for a certain value ν = νc , we have: α(νc ) = 0,
α (νc ) = 0,
λ3 (νc ) < 0
where we have set ( ) = d/dν. According to the relations between roots and coefficients of a polynomial, we have: 2α(ν) + λ3 (ν) = −P(ν) α(ν)2 + ω(ν)2 + 2α(ν)λ3 (ν) = Q(ν) [α(ν)2 + ω(ν)2 ]λ3 (ν) = −R(ν) It follows that for ν = νc : λ3 (νc ) = −P(νc ),
ω(νc )2 = Q(νc ),
ω(νc )2 λ3 (νc ) = −R(νc )
(3.70)
Thus, the conditions for the coefficients P(ν), Q(ν), and R(ν) are, respectively: P(νc ) > 0,
Q(νc ) > 0,
P(νc )Q(νc ) = R(νc ).
(3.71)
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
125
This equation allows us to compute the bifurcation point νc (if it exists). Differentiate (3.69) with respect to ν: 3λ2 λ + P λ2 + 2Pλλ + Q λ + Qλ + R = 0
(3.72)
and replace λ = α(ν) + iω(ν) and λ = α (ν) + iω (ν) in (3.72). With ν = νc , we get: 2Q(νc )α (νc ) = R (νc ) − P (νc )Q(νc ) − 2P(νc )ω(νc )ω (νc ) 2ω(νc )ω (νc ) = 2α (νc )P(νc ) + Q (νc ) It follows that: α (νc ) =
R (νc ) − P (νc )Q(νc ) − P(νc )Q (νc ) 2[Q(νc ) + P2 (νc )]
(3.73)
and thus: sgn [α (νc )] = sgn [R (νc ) − P (νc )Q(νc ) − P(νc )Q (νc )] 3.3.2.2
(3.74)
Reduction to the Normal Form
Let vi = (αi , βi , γi ),
i = 1, 2, 3
be the eigenvector of the matrix A = aij (νc ) corresponding to the eigenvalue λi , with λ1,2 = ±iω0 = ±iQ1/2 (νc ),
λ3 = −P(νc )
(3.75)
Hence: (A − λi I)vi = 0
(3.76)
The solution to the homogeneous equation (3.76) depends on an arbitrary constant. We could, for instance, compute βi , γi as a function of αi . If we replace the solutions vi of (3.76) in T ≡ (tij ) = [ v1 − v1
v3 ]
(3.77)
0882-Perruquetti-ch03_R2_290705
126
Normal Forms and Bifurcations of Vector Fields
we obtain the following expressions for the elements tij of the matrix T: t11 = α1 , t21
t12 = 0,
t13 = α3
α1 (a21 a13 − a23 a11 ) + a13 a23 ω02 = D1
t22 =
−α1 ω0 [a23 − (a21 a13 − a23 a11 )a13 ] D1
α3 [a23 λ3 + a13 a21 − a11 a23 ] D2 α1 a11 a22 − a12 a21 − ω02 − a13 (a11 + a22 )ω02 = D1 α1 ω0 a13 a11 a22 − a12 a21 − ω02 + (a11 + a22 ) = D1
t23 = t31 t32
t33 =
(3.78)
α3 [(a11 − λ3 )(a22 − λ3 ) − a12 a21 ] D2
where we have set: = a12 a23 − a13 a22 ,
D1 = 2 + a213 ω02 ,
D2 = + a13 λ3
where α1 and α3 are two arbitrary real numbers (for the sake of simplicity, we have assumed that α1 = 0).
3.3.2.3
Computation of the Coefficient a1
The system (3.54) at ν = νc reads: x˙ = A x + F(x)
(3.79)
where u = Tx, x = T −1 u and
0 A = T −1 AT = ω 0
−ω 0 0
0 0 , 0
ˆ F(x) = T −1 F(Tx, νc )
(3.80)
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
127
The calculation sketched in [3] yields: 16a1 =
1 1 Fx1 x1 + Fx12 x2 Fx11 x2 ω0 − Fx21 x1 + Fx22 x2 Fx21 x2 − Fx11 x1 Fx21 x1 + Fx12 x2 Fx22 x2 + Fx11 x1 x1 + Fx11 x2 x2 + Fx21 x1 x2 + Fx22 x2 x2 2 1 Fx1 x3 + Fx22 x3 Fx31 x1 + Fx32 x2 λ3 1 1 2 3 3 3 − − F − F F F λ F + 4ω 3 0 x x x x x x x x x x 1 3 2 3 1 1 2 2 1 2 4ω02 + λ23 2 1 2 3 3 3 + + F − F F F ω F − λ (3.81) 0 3 x x x x x x x x x x 2 3 1 3 1 1 2 2 1 2 4ω02 + λ23
−
The indices denote partial derivatives. ω0 and λ3 are given by (3.75).
Example 6 Let us determine the nature of the Hopf bifurcation for the Lorenz system: u˙ 1 = −σ u1 + σ u2 u˙ 2 = −u1 u3 + ru1 − u2
(3.82)
u˙ 3 = u1 u2 − bu3 Recall that at r > 1 (see Example 5) the system has two fixed points C and C located, respectively, at: u∗1 = u∗2 = ± b(r − 1),
u∗3 = r − 1
Let us replace u → u∗ + u in (3.82) in order to take (3.82) to the form (3.68): ˆ u˙ = Au + F(u) we get:
−σ ∂fi 1 A= = ∂u ∗ j u=u u∗ 2
Fˆ 1 (u) = 0,
Fˆ 2 (u) = −u1 u3 ,
(3.83)
σ −1 u∗1
0 −u∗1 −b
Fˆ 3 (u) = u1 u2
(3.84)
0882-Perruquetti-ch03_R2_290705
128
Normal Forms and Bifurcations of Vector Fields
The matrix A has the characteristic polynomial: λ3 + (σ + b + 1)λ2 + b(r + σ )λ + 2bσ (r − 1) = 0 For r = rc =
σ (σ + b + 3) σ −b−1
(3.85)
(3.86)
Equation (3.85) has two pure imaginary roots and a negative real root: (3.87) λ1,2 = ±iw0 , with ω0 = b(rc + σ ) and λ3 = −(σ + b + 1) Thus, replacing P(rc ) = σ + b + 1 = −λ3 , P (rc ) = 0, Q(rc ) = b(rc + σ ) = ω02 , Q (rc ) = b, R(rc ) = 2bσ (rc − 1), R (rc ) = 2bσ into (3.73), we obtain: α (rc ) =
b(σ − b − 1) 2 ω02 + λ23
(3.88)
With the choice α1 = 1, α3 = 1, in (3.78) we get: ∗ σ u1 0 σ u∗1 1 ∗ −ω0 u∗1 (σ + λ3 )u∗1 ≡ tij T= σ u1 σ u∗1 ω02 ω0 (1 + σ ) bλ3 It follows that: T −1 =
−ω0 [bλ3 + (σ + λ3 )(1 + σ )] ω0 σ (1 + σ )
1
ω0 λ23 + ω02
−[σ bλ3 + ω02 (b + 1)] ω0 [σ (1 + σ ) + ω02 ]
(3.89)
σ ω0 u∗1
σ (bλ3 − ω02 ) −λ3 σ u∗1
−ω0 σ (1 + σ ) −σ ω0 u∗1
≡ qij .
(3.90)
Let us replace (3.89), (3.90), and (3.84) in (3.80) and compute the secondorder partial derivatives of F(x). It results in: Fxi 1 x1 = 2(qi3 t21 − qi2 t31 ) Fxi 2 x2 = 0 Fxi 3 x3 = 2(qi3 t23 − qi2 t33 )
(3.91)
Fxi 1 x2 = Fxi 2 x3 = qi3 t22 − qi2 t32 Fxi 1 x3 = qi3 (t21 + t23 ) − qi2 (t31 + t33 ), Fxi k xl xj = 0,
i, j, k, l = 1, 2, 3
i = 1, 2, 3
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
129
TABLE 3.1 Values for a1 , α (rc ), and δ a1
α (r c )
δ = −a1 /α (r c )
3.86687 × 10−3 9.47803 × 10−4 1.01724 × 10−3 4.63320 × 10−4 2.40617 × 10−4
3.02225 × 10−2 2.37550 × 10−2 3.88528 × 10−2 2.64859 × 10−2 8.45106 × 10−3
−1.27947 × 10−1 −3.98990 × 10−2 −2.61818 × 10−2 −1.74931 × 10−2 −2.84718 × 10−2
b, σ b = 8/3, σ = 10 b = 10, σ = 20 b = 10, σ = 40 b = 20, σ = 40 b = 30, σ = 40
Substituting into (3.81) we obtain the Liapunov number a1 . We have Table 3.1. In this table α (rc ) is given by (3.88). Notice that the values for δ correspond to those of µ2 in Table 3.4 from [5]. For these values of b and σ , the bifurcation is subcritical and its direction is on the side r < rc .
3.3.3 The Bifurcation in the Rössler System In this section, we introduce the bifurcation in the Rössler system as an example of bifurcations of codimension 2. In general, our discussion follows Gaspard [3], but we will stop at the second order for the sake of simplicity. The Rössler system reads: u˙ 1 = −u2 − u3 ,
u˙ 2 = u1 + au2 ,
u˙ 3 = bu1 − cu3 + u1 u3
(3.92)
The system has two fixed points: 1. First fixed point: O:
u1 = u2 = u3 = 0
with the eigenvalues of the Jacobian matrix given by: λ3 + (c − a)λ2 + (1 + b − ac)λ + (c − ab) = 0
(3.93)
2. Second fixed point: P:
u1 = c − ab,
c u2 = b − , a
u3 =
c −b a
(3.94)
with the eigenvalues of the Jacobian matrix given by: c λ3 + a(b − 1)λ2 + 1 + − a2 b λ − (c − ab) = 0 a
(3.95)
0882-Perruquetti-ch03_R2_290705
130
Normal Forms and Bifurcations of Vector Fields
The two fixed points coalesce on the surface c = ab of the parameter space. The common eigenvalues are hence given by: √ √ with ω = (2 − a2 )1/2 if b = 1, − 2 ≤ a ≤ 2
(±iω, 0)
(3.96)
The set of bifurcation points of this type is the segment b = 1,
√ √ − 2≤a≤ 2
c = a,
(3.97)
in the parameter space R3 . It is hence a bifurcation of codimension 2. Let us seek the unfolding around the bifurcation point b = 1, c = ab = a; for this purpose, we set: b = 1 + ε1 , 3.3.3.1
c = a + ε2
(3.98)
Reduction to the Normal Form
When ε1 = ε2 = 0, the system (3.92) reads: ˆ u˙ = Au + F(u) with
−1 a 0
0 A = 1 1
(3.99)
−1 0 −a
ˆ and F(u) = (0, 0, u1 u3 )T . The first step in the reduction procedure is to write (3.99) in the form (3.79) and (3.80). The eigenvalues of the matrix A are given by (3.96). With respect to the eigenvector basis, v2 = v¯ 1 ,
v1 = (2, −a − iω, a − iω),
v3 = (a, −1, 1)
the new variables, η = (η1 , η2 , η3 ), are related to the old variables through: u = Tη,
η = T −1 u
where T is the transformation matrix [ v1 , − v1 , v3 ]:
2 T = −a a
0 ω ω
a −1 , 1
1
T
−1
1 = 2 ω
0 −a
a 2 ω 2 −1
−
a 2 ω 2 1
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
131
provided that ω2 + a2 = 2. Equation (3.99) reads: η˙ = A η + F(η) with
0 A = T −1 AT = ω 0
0 0 , 0
−ω 0 0
ˆ F(η) = T −1 F(Tη)
or, setting χ = η1 + iη2 χ˙ = iωχ −
a − iω (χ , χ¯ , η3 ), 2ω2
with
(χ , χ¯ , η3 ) = (χ + χ¯ + aη3 )
η˙ 3 =
1 (χ , χ¯ , η3 ) ω2
(3.100)
1 1 (a − iω)χ + (a + iω)χ¯ + η3 2 2
To eliminate the nonresonant terms of order 2, we perform a quadratic transformation η = ζ + h(2) ζ ζ which can be written in the form: ¯ 3 + α33 ζ32 χ = ψ + α11 ψ 2 + α12 ψ ψ¯ + α22 ψ¯ 2 + α13 ψζ3 + α23 ψζ ¯ 3 + β33 ζ32 η3 = ζ3 + β11 ψ 2 + β12 ψ ψ¯ + β22 ψ¯ 2 + β13 ψζ3 + β23 ψζ with ψ = ζ1 + iζ2 . We can now write (3.100) in the form: ¯ ζ3 ) (1 + A1 )ψ˙ = −A2 ψ˙¯ − A3 ζ˙3 + f (ψ, ψ,
(3.101)
¯ ζ3 ) (1 + B1 )ζ˙3 = −B2 ψ˙ − B3 ψ˙¯ + g(ψ, ψ,
(3.102)
where we have set A1 = 2α11 ψ + α12 ψ¯ + α13 ζ3 , A2 = α12 ψ + 2α22 ψ¯ + α23 ζ3 , A3 = α13 ψ + α23 ψ¯ + 2α33 ζ3 , B1 = β13 ψ + β23 ψ¯ + 2β33 ζ3 , B2 = ¯ ζ3 ), 2β11 ψ + β12 ψ¯ + β13 ζ3 , B3 = β12 ψ + 2β22 ψ¯ + β23 ζ3 , and f (ψ, ψ, ¯ ζ3 ) as the right-hand sides of (3.100). At the order considered, we g(ψ, ψ, can replace: in the first relation, ψ˙¯ and ζ˙3 , respectively, with −iωψ¯ and 0; ¯ Besides, to isoand in the second relation, ψ˙ and ψ˙¯ with iωψ and −iωψ. late ψ˙ and ζ˙3 , we multiply (3.101) by (1 − A1 ) and (3.102) by (1 − B1 ) (see Example 3). After eliminating the nonresonant terms: i(a − iω)2 i ω + 2ia , α22 = − 3 , α23 = − , 4ω3 6ω 4ω3 a(ω + ia) = α33 = − = 2aβ11 = 2aβ¯22 , 2ω3
α11 = α12
β13 = −
aω + i(2 + a2 ) = β¯23 , 2ω3
α13 , β12 , β33 arbitrary
0882-Perruquetti-ch03_R2_290705
132
Normal Forms and Bifurcations of Vector Fields
we obtain the following simplified system: iω(1 + a2 ) a a2 − ψζ3 2a ω2 2 a ζ˙3 = 2 ζ32 + ψ ψ¯ , with ψ = ζ1 + iζ2 ω ψ˙ = iωψ −
where the resonant terms are independent of αij , βij . Eventually, by an appropriate change of scales ζ1 = −
ω2 x, a
ζ2 = −
ω2 y, a
ζ3 = −
ω2 z a
we obtain the Guckenheimer–Holmes normal form [4]: q˙ = iωq + (α + iβ)zq,
z˙ = −z2 − |q|2 ,
q = x + iy
(3.103)
with α=
a2 , 2
β=−
ω(a2 + 1) 2a
(3.104)
The unfolding of (3.103) is, according to [4], q˙ = (µ1 + iω)q + (α + iβ)zq,
z˙ = µ2 − z2 − |q|2
(3.105)
To compute µ1 , µ2 as a function of ε1 , ε2 in (3.98), notice that the fixed points of (3.105) are: P± :
|q| = 0,
√ z = ± µ2
if µ2 > 0
It suffices thus to identify the eigenvalues at P± (computed as a function of µ1 , µ2 ) with the eigenvalues at O and P (computed as a function of ε1 , ε2 ). In the coordinate system (q, q¯ , z), the Jacobian matrix at the fixed points P± is diagonal: √ 0 0 µ1 + iω ± (α + iβ) µ2 √ √ 0 µ1 − iω ± (α − iβ) µ2 0 J(0, 0, ± µ2 ) = √ 0 0 ∓2 µ2 We may now compute the eigenvalues λ1 , λ2 , λ3 for P+ : √ λ1 = µ1 + iω + (α + iβ) µ2 , so that:
λ2 = λ¯ 1 ,
√ λ3 = −2 µ2
√ λ1 + λ2 + λ3 = 2µ1 + 2(α − 1) µ2
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
133
Since we identify P+ with O, λ1 , λ2 , λ3 are also roots of (3.93), and thus: √ 2µ1 + 2(α − 1) µ2 = −(c − a) using the relations between roots and coefficients of a polynomial. We encounter an analogous relation for P− : √ 2µ1 − 2(α − 1) µ2 = −a(b − 1) It follows that: 1 µ1 = − (aε1 + ε2 ), 4
µ2 =
(aε1 − ε2 )2 4(a2 − 2)2
where we have taken into account (3.98) and (3.104). 3.3.3.2 Bifurcation Diagram Let us write (3.105) in cylindrical coordinates (q = r eiφ , z): r˙ = (µ1 + αz)r
(3.106a)
z˙ = µ2 − z2 − r2
(3.106b)
φ˙ = ω + βz
(3.106c)
Equation (3.106c) can be decoupled from the others. The bifurcation diagram for the system (3.106a) and (3.106b) is displayed in Figure 3.4. Note m2
L
L´
m1
FIGURE 3.4 Bifurcation diagram for the Rössler model.
0882-Perruquetti-ch03_R2_290705
134
Normal Forms and Bifurcations of Vector Fields z
z r
0
r
0 L f r
z 0
r
0 T2 f
z
z y f
0
x
r
f FIGURE 3.5 Correspondence between (r, z) and (r, φ, z).
that a fixed point on the (r, z) plane corresponds to a periodic orbit, a limit cycle corresponds to a torus in three-dimensional space, and so forth (see Figure 3.5). If µ2 > 0, the system (3.106a) and (3.106b) has two fixed points: r = 0,
√ z = ± µ2
and, inside the parabola L of equation, µ2 =
µ21 α2
0882-Perruquetti-ch03_R2_290705
3.3
Bifurcations
135
a third fixed point:
µ2 r = µ2 − 21 α
1/2 z=−
,
µ1 α
(3.107)
In cylindrical coordinates (r, φ, z), the latter corresponds to a limit cycle. The stability of the fixed points is determined by the eigenvalues of the Jacobian matrix µ1 + αz αr (3.108) J(r, z) = −2r −2z √ at these points. For the fixed points (r, z) = (0, ± µ2 ), the matrix (3.108) is diagonal: √ √ 0 µ1 ± α µ2 √ J(0, ± µ2 ) = 0 ∓2 µ2 The classification of these fixed points is summarized in Table 3.2. The matrix (3.108) for the fixed point (3.107) reads: "
0
2" 2 − α µ2 − µ21 α
α 2 µ2 − µ21 µ1 2 α
This matrix has eigenvalues:
λ1,2 =
µ1 ±
"
(1 + 2α)µ21 − 2α 3 µ2 α
They are complex conjugates inside the parabola L of equation: (1 + 2α)µ21 − 2α 3 µ2 = 0 TABLE 3.2 Classification of fixed points (r, z) √ µ1 > α µ 2 √ √ α µ2 > µ1 > −α µ2 √ −α µ2 > µ1
√ (0, + µ2 )
√ (0, − µ2 )
Saddle
Source
Saddle
Saddle
Sink
Saddle
0882-Perruquetti-ch03_R2_290705
136
Normal Forms and Bifurcations of Vector Fields
and we can easily remark that, along the axis µ1 = 0, µ2 > 0, there is a Hopf bifurcation at the fixed point (3.107) (see Figure 3.4). In fact, for µ1 = 0, the system (3.106a) and (3.106b) is integrable, with solution curves αr2/α r2 2 −z =C µ2 − 2 1+α
References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
R.I. Bogdanov, Funct. Anal. Appl., 9, 144, 1975. H. Dang-Vu and C. Delcarte, Bifurcations et Chaos, Ellipses, Paris, 2000. P. Gaspard, Physica, 62D, 94, 1993. J.A. Guckenheimer and P.J. Holmes, Nonlinear Oscillations, Dynamical Systems and Bifurcations of Vector Fields, Springer-Verlag, New York, 1983. B.D. Hassard, N.D. Kazarinoff, and Y.H. Wan, Theory and Applications of Hopf Bifurcation, Cambridge University Press, Cambridge, 1981. P. Manneville, Systèmes Dynamiques et Chaos, École Polytechnique, Palaiseau, 1999. J.E. Marsden and M. McCracken, The Hopf Bifurcation and Its Applications, Springer-Verlag, Berlin, 1976. F. Pham, Géométrie et Calcul Différentiel sur les Variétés, Dunod, Paris, 1999. F. Takens, Publ. Math. IHES, 43, 47, 1974. S. Wiggins, Introduction to Applied Nonlinear Dynamical Systems and Chaos, Springer-Verlag, Berlin, 1990.
0882-Perruquetti-ch04_R2_180805
4 Feedback Equivalence of Nonlinear Control Systems: A Survey on Formal Approach
W. Respondek and I. A. Tall
CONTENTS 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Equivalence of Dynamical Systems: Poincaré Theorem . . . . . . 4.3 Normal Forms for Single-Input Systems with Controllable Linearization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.2 Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.3 Normal Form and m-Invariants . . . . . . . . . . . . . . . . . . 4.3.4 Normal Form for Non-affine Systems . . . . . . . . . . . . . 4.4 Canonical Form for Single-Input Systems with Controllable Linearization . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Dual Normal Form and Dual m-Invariants . . . . . . . . . . . . . . . 4.6 Dual Canonical Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7 Normal Forms for Single-Input Systems with Uncontrollable Linearization . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.2 Taylor Series Expansions . . . . . . . . . . . . . . . . . . . . . . . 4.7.3 Linear Part and Resonances . . . . . . . . . . . . . . . . . . . . . 4.7.4 Notations and Definitions . . . . . . . . . . . . . . . . . . . . . . 4.7.5 Weighted Homogeneous Systems . . . . . . . . . . . . . . . . 4.7.6 Weighted Homogeneous Invariants . . . . . . . . . . . . . . . 4.7.7 Explicit Normalizing Transformations . . . . . . . . . . . . . 4.7.8 Weighted Normal Form for Single-Input Systems with Uncontrollable Linearization . . . . . . . . . . . . . . . . . . . . 4.7.9 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8 Normal Forms for Multi-Input Nonlinear Control Systems . . . 4.8.1 Non-affine Normal Forms . . . . . . . . . . . . . . . . . . . . . . 4.8.2 Affine Normal Forms . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 138 . 147 . . . . .
151 151 152 153 162
. 164 . 172 . 176 . . . . . . . .
178 178 179 181 182 185 190 192
. . . . . .
193 195 198 200 202 203 137
0882-Perruquetti-ch04_R2_180805
138
Feedback Equivalence of Nonlinear Control Systems
4.9 Feedback Linearization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.10 Normal Forms for Discrete Time Control Systems . . . . . . . . . . 4.10.1 Example: Bressan and Rampazzo Pendulum . . . . . . . . . 4.11 Symmetries of Control Systems . . . . . . . . . . . . . . . . . . . . . . . . 4.11.1 Symmetries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.11.2 Symmetries of Single-Input Nonlinearizable Systems . . . 4.11.3 Symmetries of the Canonical Form . . . . . . . . . . . . . . . . 4.11.4 Formal Symmetries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.11.5 Symmetries of Feedback Linearizable Systems . . . . . . . . 4.12 Feedforward and Strict Feedforward Forms . . . . . . . . . . . . . . . 4.12.1 Introduction and Notations . . . . . . . . . . . . . . . . . . . . . . 4.12.2 Feedforward and Strict Feedforward Normal Forms . . . 4.12.3 Feedforward and Strict Feedforward Form: First Nonlinearizable Term . . . . . . . . . . . . . . . . . . . . . . . . . . 4.12.4 Feedforward and Strict Feedforward Forms: The General Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.12.5 Feedforward and Strict Feedforward Systems on R4 . . . 4.12.5.1 Feedforward Case . . . . . . . . . . . . . . . . . . . . . . 4.12.5.2 Strict Feedforward Case . . . . . . . . . . . . . . . . . . 4.12.6 Geometric Characterization of Feedforward and Strict Feedforward Systems . . . . . . . . . . . . . . . . . . . . . . 4.12.7 Symmetries and Strict Feedforward Form . . . . . . . . . . . 4.12.8 Strict Feedforward Form: Affine Versus General . . . . . . 4.12.9 Strict Feedforward Systems on the Plane . . . . . . . . . . . . 4.13 Analytic Normal Forms: A Class of Strict Feedforward Systems 4.14 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.1
210 215 219 221 222 223 225 225 228 232 232 235 237 239 242 242 244 246 247 251 252 253 256 257
Introduction
In this chapter, we will deal with nonlinear control systems of the form: : x˙ = F(x, u) where x ∈ X is an open subset of Rn and u ∈ U ⊂ Rm , and F(x, u) is a family of vector fields, C∞ -smooth, with respect to (x, u). The variables x = (x1 , . . . , xn )T represent the state of the system and the variables u = (u1 , . . . , um )T represent the control (i.e., an external influence on the system). can be understood as underdetermined system of ordinary differential equations: n equations for n + m variables.
0882-Perruquetti-ch04_R2_180805
4.1
Introduction
139
We are interested in equivalence problems for the system . Consider another system of the same form: ˜ x, u) ˜ : x˙˜ = F(˜ ˜ ˜ is an open subset of Rn and u˜ ∈ U ˜ ⊂ Rm . A natural equivalence where x˜ ∈ X ˜ We say that and ˜ are can be defined as follows. Assume that U = U. state-space equivalent (S-equivalent), if there exist a diffeomorphism x˜ = φ(x) u˜ = u transforming solutions into solutions. More precisely, if (x(t), u(t)) is a ˜ which is equivalent to solution of , then (φ(x(t)), u(t)) is a solution of , ˜ Dφ(x) · F(x, u) = F(φ(x), u) for any u ∈ U, where Dφ(x) denotes the derivative of φ at x. This means that the S-equivalent establishes a diffeomorphic correspondence of the right-hand sides of differential equations corresponding to the constant controls, which can be expressed as ˜ x, u), (φ∗ F)(˜x, u) = F(˜
u∈U
where, for any vector field f and any diffeomorphism x˜ = φ(x), we denote (φ∗ f )(˜x) = Dφ(φ −1 (˜x)) · f (φ −1 (˜x)). S-equivalence is well understood. It establishes a one-to-one smooth correspondence between the trajectories of equivalent systems (corresponding to the same measurable, not necessarily constant, controls). For accessible systems [38, 66], the set of complete invariants for the local S-equivalence is formed by all iterative Lie-brackets evaluated at a nominal point (in the analytical case) or in its neighborhood (in the smooth case) [40]. Since the system has state and control variables, another natural transformation is to apply to a diffeomorphism ϒ = (φ, ψ)T of X × U onto ˜ ×U ˜ that changes both x and u, that is: X x˜ = φ(x, u) u˜ = ψ(x, u) ˜ Taking a C1 and transforms the solutions of into those of . solution (x(t), u(t)) of and using the fact that its image (φ(x(t), u(t)),
0882-Perruquetti-ch04_R2_180805
140
Feedback Equivalence of Nonlinear Control Systems
˜ we conclude that ψ(x(t), u(t)) is assumed to be a solution of , ˜ (∂φ/∂x)F(x, u) + (∂φ/∂u)u˙ = F(φ(x, u), ψ(x, u)). Now, it is easy to see that, ˙˜ the map φ cannot since F and F˜ do not depend on, respectively, u˙ and u, depend on u. This implies that any ϒ preserving the system solutions must actually be a triangular diffeomorphism ϒ: satisfying
x˜ = φ(x) u˜ = ψ(x, u)
˜ Dφ(x) · F(x, u) = F(φ(x), ψ(x, u)),
˜ equivalent which is called a feedback transformation. Systems and , through ϒ, are called feedback equivalent (F-equivalent). The states x and x˜ of two feedback-equivalent systems are thus related by a diffeomor˜ whereas the phism φ between the corresponding state-spaces X and X, ˜ controls u and u˜ are related by a diffeomorphism ψ between U and U ˜ which depends on the state x. We will call and locally feedback equivalent at (x0 , u0 ) and (˜x0 , u˜ 0 ), respectively, if (φ, ψ) is a local diffeomorphism satisfying (φ, ψ)(x0 , u0 ) = (˜x0 , u˜ 0 ). The feedback equivalence and its local counterpart are the main topics of this chapter. Note that the diffeomorphism φ establishes a one-to-one correspondence of x-trajectories of two feedback-equivalent systems although equivalent trajectories are differently parameterized by controls. Indeed, a trajectory x(t) of the first system corresponding to a control u(t) is mapped into ˜ corresponding to u(t) ˜ = the curve φ(x(t)), which is the trajectory of ψ(x(t), u(t)). On the basis of this observation, one can define a weaker ˜ asking that there exists a one-to-one cornotion of equivalence of and respondence between trajectories (corresponding to, e.g., C∞ -controls) and omitting the assumption that the correspondence is given by a diffeomorphism. This leads to the important notion of dynamic feedback equivalence [19, 20, 41, 68], which, however, we will not discuss in this chapter. The main subject of this chapter is feedback equivalence, which has been extensively studied during the last 20 years. Although natural, this problem is very involved (mainly because of the functional parameters appearing in the classification that will be explained briefly below). Many existing results are devoted to systems that are affine with respect to controls, that is, are of the form : x˙ = f (x) +
m
gi (x)ui = f (x) + g(x)u
i=1
where x ∈ X, f and gi are C∞ -smooth control vector fields on X, u = (u1 , . . . , um )T ∈ U = Rm and g = ( g1 , . . . , gm ). When studying the feedback
0882-Perruquetti-ch04_R2_180805
4.1
Introduction
141
equivalence of control-affine systems, we will apply feedback transformations that are affine with respect to controls: :
x˜ = φ(x) u = α(x) + β(x)u˜
˜ = α(x) + β(x)u, ˜ with α and β being C∞ -smooth funcwhere u = ψ −1 (x, u) m tions with values in R and Gl(m, R), respectively. Consider another control-affine system ˜ : x˙˜ = f˜ (˜x) +
m
g˜ i (˜x)u˜ i = f˜ (˜x) + g˜ (˜x)u˜
i=1
˜ = Rm and g˜ = ( g˜ 1 , . . . , g˜ m ). where u˜ = (u˜ 1 , . . . , u˜ m )T ∈ U ˜ The general definition implies that the control-affine systems and are feedback equivalent if and only if φ∗ ( f + gα) = f˜
and φ∗ (gβ) = g˜
which we will write as ˜ ∗ () = ˜ are locally feedback We will say that the control-affine systems and equivalent at x0 and x˜ 0 , respectively, if φ is a local diffeomorphism satisfying φ(x0 ) = x˜ 0 and α and β are defined locally around x0 . Note that local feedback equivalence is local in the state-space X but global in the control space U = Rm . ˜ the problem of their (local) Given two control-affine systems and , feedback equivalence amounts to solving the system of first-order partial differential equations ∂φ (x)( f (x) + g(x)α(x)) = f˜ (φ(x)) ∂x ∂φ (x)(g(x)β(x)) = g˜ (φ(x)) ∂x
(CDE)
Feedback equivalence of general systems under ϒ and of control-affine systems under are very closely related. Consider a general nonlinear control system : x˙ = F(x, u)
0882-Perruquetti-ch04_R2_180805
142
Feedback Equivalence of Nonlinear Control Systems
where x ∈ X, an open subset of Rn and u ∈ U, an open subset of Rm . Together with , its extension (preintegration) e : x˙ e = f e (xe ) + ge (xe )ue where xe = (x, u) ∈ X e = X × U, ue ∈ U e = Rm , and the dynamics are given by x˙ = F(x, u) u˙ = ue that is, f e (xe ) = (F(x, u), 0)T and ge (xe ) = (0, Id)T . Notice that e is a control-affine system controlled by the derivatives u˙ i = uei of the original controls ui , for 1 ≤ i ≤ m. PROPOSITION 1
˜ are equivalent (resp. locally equivalent at (x0 , u0 ) Two control systems and and (˜x0 , u˜ 0 )) under a general feedback transformation ϒ if and only if their respec˜ e are equivalent (resp. locally equivalent at xe = (x0 , u0 ) tive extensions e and 0 e and x˜ 0 = (˜x0 , u˜ 0 )) under an affine feedback . As a consequence, many problems concerning feedback equivalence are studied and solved for control-affine systems and their extension to the general case can be done by an appopriate application of Proposition 1. To geometrize the problem of feedback equivalence, we associate its field of admissible velocities to the system F(x) = {F(x, u) : u ∈ U} ⊂ Tx X The field of admissible velocities of the control-affine system is the following field of affine subspaces (equivalently, an affine distribution): A(x) = f (x) +
m
gi (x)ui : ui ∈ R = f (x) + G(x) ⊂ Tx X
i=1
where G denotes the distribution spanned by the vector fields g1 , . . . , gm . ˜ are feedNow it is easy to see that if two control affine-systems and back equivalent, then the corresponding affine distributions are equivalent, that is: φ∗ A = A˜ Moreover, the converse holds if the distributions G and G˜ are of constant rank m. Analogous implications (the converse under the constant rank
0882-Perruquetti-ch04_R2_180805
4.1
Introduction
143
assumption) are true for local feedback equivalence. Note that attaching the field of admissible velocities to an affine system results in eliminating controls from the description: what remains is a geometric object, which is the affine distribution A while the choice of controls (equivalently, the choice of sections of A) becomes irrelevant.
Example 1 To illustrate the notion of feedback equivalence, recall the first (historically) studied feedback classification problem, which is that for linear control systems of the form
: x˙ = Ax + Bu = Ax +
m
ui b i
i=1
where x ∈ Rn , Ax and b1 , . . . , bm are, respectively, linear and constant vector fields on Rn , and u = (u1 , . . . , um )T ∈ Rm . To preserve the linear form of the system, we apply to it the linear feedback transformation. x˜ = Tx u = Kx + Lu˜ where T, K, and L are matrices of appropriate sizes (T and L being invertible). The system is transformed into ˜ x + B˜ u˜ = T(A + BK)T −1 x˜ + TBLu˜ ˜ : x˙˜ = A˜
It is a classical result of the linear control theory [49] that any linear controllable system is feedback equivalent to the following system (called Brunovský canonical form): x˙˜ i,j = x˜ i,j+1 x˙˜ i,ρi = u˜ i
1 ≤ j ≤ ρi − 1
1≤i≤m
. , x˜ m,ρm )T . where x˜ = (˜x1,1 , x˜ 1,2 , . . . , x˜ 1,ρ1 , . . The integers ρ1 ≥ · · · ≥ ρm , m i=1 ρi = n (called controllability indices, Brunovský indices, or Kronecker indices) form a set of complete feedback invariants of the linear feedback linear group action on controllable systems and are defined as follows ρi = {qj | qj ≥ i}
(4.1)
where m0 = 0, mi = rank (B, . . . , Ai−1 B) and qi = mi − mi−1 for 1 ≤ i ≤ n.
0882-Perruquetti-ch04_R2_180805
144
Feedback Equivalence of Nonlinear Control Systems
Note that for the linear control system , the field of admissible velocities is given by the field of m-dimensional affine subspaces A(x) = Ax + B of Rn , where B is the image of Rm under the linear map B : Rm → Rn . The Brunovský canonical form thus gives a canonical form for the field A under linear invertible transformations x˜ = Tx. Observe that the dimension of the space of linear systems (of pairs (A, B)) is n2 + nm, and the dimension of the group of linear feedback (of the triples (T, K, L)) is n2 + nm + m2 . We can thus expect open orbits to exist and, indeed, they do (those of systems with the maximal vector of di ’s). The picture gets completely different for nonlinear control systems under the action of nonlinear feedback. Although both are infinite dimensional, the group of (local) feedback transformations is much “smaller” than the space of all (local) control systems and, as a consequence, functional parameters must necessarily appear in the feedback classification. To observe this, note that the space of general systems is parameterized by n functions of n + m variables (components of F) while the group of feedback transformations by m functions of n + m variables (components of ψ) and n functions of n variables (components of φ). Thus, functional parameters are to be expected if m < n, that is, in all interesting cases. To make this argument precise, we will follow Ref. [40] and compute the dimension d (k) of the space of k-jets of the system and the dimension dϒ (k) of the corresponding jet-space of the feedback group acting on the space of k-jets of the systems. To this end, recall that the dimension of the space of polynomials of n variables, of degree not greater than k, is equal to (k + n)! (k + 1)(k + 2) · · · (k + n) = k!n! n! which is a polynomial of k of degree n starting with k n /n!. The dynamics of the system are represented by n components of F(x, u), each being a function of n + m variables. The feedback group is represented by n components of the diffeomorphism φ(x), each being a function of n variables and m components of the map ψ(x, u), each being a function of n + m variables. Note that the (k + 1)-jet of a diffeomorphism acts on the k-jet of the system. Thus d (k) = n
(k + n + m)! , k!(n + m)!
dϒ (k) = n
(k + n + m)! (k + 1 + n)! +m (k + 1)!n! k!(n + m)!
The codimension of any orbit, of the feedback group action on the space of systems, is bounded from below by the difference d (k) − dϒ (k), which is a polynomial of k of degree n + m, whose coefficient multiplying k n+m is n−m (n + m)!
0882-Perruquetti-ch04_R2_180805
4.1
Introduction
145
This coefficient is positive when m < n, and thus the polynomial and the codimension of any orbit tend to infinity when k tends to infinity. As a consequence, functional moduli must appear in the feedback classification if m < n (which exhausts all interesting cases). Observe that a control-affine system is defined by m + 1 vector fields f , g1 , . . . , gm and the feedback group by the diffeomorphism φ and m + m2 components of the pair (α, β). Therefore, in the case of control-affine systems the corresponding dimensions are: d = n(m + 1)
(k + n)! , k!(n)!
d = n
(k + n)! (k + 1 + n)! + m(m + 1) (k + 1)!n! k!(n)!
The codimension of any orbit in the k-jets space is bounded below by the difference d − d , which is a polynomial of k of degree n, whose coefficient multiplying k n is m(n − m − 1) n! If m < n − 1, then this coefficient is positive and thus the polynomial and the codimension of any orbit under the feedback group action tend to infinity as k tends to infinity. As a consequence, functional moduli must appear in feedback classification of control-affine systems if m < n − 1. In the case m = n − 1 we can hope, however, for normal forms without functional parameters and, indeed, such normal forms have been obtained by Respondek and Zhitomirskii both for m = 2, n = 3 [75] and for the general case [95]. It is the existence of functional moduli which causes one of the main difficulties of the feedback equivalence problem. Four basic methods have been proposed to study various aspects of feedback equivalence. The first method, used for control-affine systems, is based on studying invariant properties of two geometric objects attached to the system: the distribution G and the affine distribution A. Note that feedback equivalence of control-linear systems (i.e., control-affine system with f ≡ 0) coincides with equivalence, under a diffeomorphism, of the corresponding distri˜ Thus this approach is linked, in a natural way, with the butions G and G. classification and with singularities of vector fields and distributions, and their invariants. Using this method a large variety of feedback classification problems have been solved [9, 11, 14, 37, 40, 45, 46, 56, 69, 75, 95]. The second approach, proposed by Gardner [21], uses Cartan’s method of equivalence [13]. To the control system , we can associate the Pfaffian system given by the differential forms dxi − Fi (x, u) dt, for 1 ≤ i ≤ n, ˜ is analyzed by on X × U × R, and the feedback equivalence of and studying the equivalence of the corresponding Pfaffian systems and their geometry [23–25, 62].
0882-Perruquetti-ch04_R2_180805
146
Feedback Equivalence of Nonlinear Control Systems
The third method, inspired by the hamiltonian formalism for optimal control problems, has been developed by Bonnard and Jakubczyk [8, 9, 42, 44] and has led to a very nice description of feedback invariants in terms of singular extremals. Another approach based also on the hamiltonian formalism for optimal control has been proposed by Agrachev [1, 2] and has led to a construction of a fundamental geometric invariant of feedback equivalence: the curvature of control systems. Finally, a very fruitful approach was proposed by Kang and Krener [54] and then followed by Kang [50, 51]. Their idea, which is closely related to the classical Poincaré’s technique for linearization of dynamical systems [3], is to analyze the system and the feedback transformation ϒ (the system and the transformation , respectively, in the control-affine case) step by step and, as a consequence, to produce a simpler equivalent system ˜ also step by step. It is this approach, and various classification results obtained using it, which form the subject of this chapter. This chapter is organized as follows. We will present in Section 4.2 the classical Poincaré’s approach to the problem of formal equivalence of dynamical systems. In Section 4.3, we will generalize, following Kang and Krener, the formal approach to nonlinear control systems. We will present a normal form for homogeneous systems, their invariants, explicit normalizing transformations and, finally, a normal form under a formal feedback. We will also extend the normal form to general non-affine systems. Then, in Section 4.4, we will propose a canonical form for nonlinear control systems. In the following two sections (Section 4.5 and Section 4.6) we will dualize results of preceding sections and present a dual normal form (together with dual invariants and explicit normalizing transformations) and a dual canonical form. Then, in Section 4.7, we will pass to systems with uncontrollable linearization; introduce weighted homogeneity; and present a normal form, invariants, explicit normalizing transformations, and a formal normal form. This section generalizes, on the one hand, results of systems with controllable linearization (presented in earlier sections) and, on the other hand, results on dynamical systems from Section 4.2. Section 4.8 will be devoted to multi-input normal forms (for space-related reasons we treat only the controllable case): it generalizes results on normal forms obtained in Section 4.3. A discrete time version of Section 4.3 will be given in Section 4.10. In Section 4.9, we compare well-known results devoted to feedback linearization with their counterpart obtained via the formal feedback. We will also discuss systems that are feedback equivalent to linear uncontrollable systems. Then the following two sections present applications of the formal approach to the classification of control systems. We discuss symmetries of control systems in Section 4.11 and show an enormous difference between the group of symmetries of feedback linearizable and nonlinearizable systems. In Section 4.12, we characterize, using the formal approach, systems that are feedback equivalent to feedforward
0882-Perruquetti-ch04_R2_180805
4.2
Equivalence of Dynamical Systems: Poincaré Theorem
147
and strict feedforward forms. Finally, in Section 4.13, we present a class of analytic strict feedforward forms than can be transformed to a normal form via constructive analytic transformations. Because of space limit, this chapter does not touch many important results. To mention just a few: we do not discuss analysis of bifurcations based on formal approach [52, 53, 59, 60], bifurcations of discrete time systems, or normal forms for observed dynamics. Each of those subjects requires its own survey, proving the efficiency of the formal approach.
4.2
Equivalence of Dynamical Systems: Poincaré Theorem
In this section, we will summarize very briefly Poincaré’s approach to the problem of (formal) equivalence of dynamical systems. The goal of this section is three-fold. First, to make our survey complete and self-contained. Secondly, to show how the formal approach to the equivalence of dynamical systems generalizes to the formal approach to feedback equivalence of control systems. Thirdly, some of results on formal normal forms for dynamical systems and of formal linearization (Theorem 1 and Theorem 2 stated at the end of this section) will be used in Section 4.7 and Section 4.9 of the survey. Consider the uncontrolled dynamical system x˙ = f (x) where x ∈ X, an open subset of Rn and f is a C∞ -smooth vector field on X. A C∞ -smooth diffeomorphism x˜ = φ(x) brings the considered dynamical system into x˙˜ = f˜ (˜x) = (φ∗ f )(˜x) where (φ∗ f )(˜x) =
∂φ −1 (φ (˜x)) · f (φ −1 (˜x)) ∂x
Now given two dynamical systems x˙ = f (x) and x˙˜ = f˜ (˜x), the problem of establishing their equivalence is to find a diffeomorphism x˜ = φ(x) satisfying ∂φ (x) · f (x) = f˜ (φ(x)) (DE) ∂x
0882-Perruquetti-ch04_R2_180805
148
Feedback Equivalence of Nonlinear Control Systems
which is a system of n first-order partial differential equations for the components of φ(x). Notice that in the most interesting cases of f (x0 ) = f˜ (˜x0 ) = 0, this is a system of singular partial differential equations. Consider the infinite Taylor series expansion of our dynamical system x˙ = f (x) = Jx +
∞
f [m] (x)
m=2
around an equilibrium, which is assumed to be x0 = 0 ∈ Rn , where f [m] denotes a polynomial vector field, all of whose components are homogenous polynomials of degree m. Apply to it a formal change of coordinates given by an invertible formal transformation of the form x˜ = φ(x) = x +
∞
φ [m] (x)
m=2
which preserves 0 ∈ Rn and starts with the identity, where all components of φ [m] are homogeneous polynomials of degree m. To study the action of φ(x) on f (x), we will see how its homogenous part of degree m acts on terms of degree m of f . To this end, apply to x˙ = Jx + f [m] (x) the transformation x˜ = x + φ [m] (x) where m ≥ 2. We have, modulo terms of higher degree, ∂φ [m] x˙˜ = Jx + f [m] (x) + (x) Jx + f [m] (x) ∂x ∂φ [m] = J x˜ − Jφ [m] (x) + f [m] (x) + (x)Jx ∂x = J x˜ + f [m] (x) + Jx, φ [m] (x) = J x˜ + f˜ [m] (˜x) where [v, w](x) = (∂w/∂x)(x)v(x) − (∂v/∂x)(x)w(x) is the Lie bracket of two vector fields v and w. Using the notation adv w = [v, w], we obtain adJx φ [m] (x) = f˜ [m] (x) − f [m] (x) which we will call a homological equation.
(HE)
0882-Perruquetti-ch04_R2_180805
4.2
Equivalence of Dynamical Systems: Poincaré Theorem
149
Consider the action of adJx on the space P[m] of polynomial vector fields, all of whose components are homogeneous polynomials of degree m. For k a multi-index k = (k1 , . . . , kn ), denote xk = x11 · · · xnkn . LEMMA 1
Assume that J is diagonal, say J = diag(λ1 , . . . , λn ). Then adJx is a diagonal operator on the space P[m] in the eigenbasis formed by the eigenvectors xk (∂/∂xi ), for all multi-indices k such that k1 + · · · + kn = m and 1 ≤ i ≤ n. The eigenvalues of adJx depend linearly on the eigenvalues of J, more precisely, we have
∂ ∂ adJx xk = (k, λ) xk ∂xi ∂xi where λ = (λ1 , . . . , λn ), and (k, λ) = k1 λ1 + · · · + kn λn . COROLLARY 1
The operator adJx is invertible on the space P[m] if there does not hold any relation of the form n
ks λs = λj
s=1
where ks are nonnegative integers, |k| = k1 + · · · + kn ≥ 2 and 1 ≤ j ≤ n. For any relation λj =
n
s=1 ks λs ,
called resonance, we define
Rj = {k = (k1 , . . . , kn ) : λj = k1 λ1 + · · · + kn λn ,
ki ∈ N ∪ {0}, |k| ≥ 2},
which will be called the resonant set associated with λj . THEOREM 1
Consider the differential equation x˙ = f (x) = Jx +
∞
f [m] (x)
m=2
and assume that all eigenvalues are real and distinct, and that the spectrum of J is nonresonant: 1. For each m ≥ 2 and any homogenous vector fields f [m] and f˜ [m] of degree m, the homological equation (HE) is solvable within the class of Rn -valued homogeneous polynomials φ [m] of degree m.
0882-Perruquetti-ch04_R2_180805
150
Feedback Equivalence of Nonlinear Control Systems
[m] (x) and x ˙˜ = f˜ (˜x) = 2. The differential equations x˙ = f (x) = Jx + ∞ m=2 f ∞ ˜ [m] through an invertible formal transforJ x˜ + m=2 f (˜x) are equivalent [m] (x). mation of the form x˜ = x + ∞ m=2 φ [m] (x) can be formally 3. The differential equation x˙ = f (x) = Jx + ∞ m=2 f ˙ linearized, that is, can be brought to the form through an invertible x˜ = J x˜[m] φ (x). formal transformation of the form x˜ = x + ∞ m=2 Item (1) is a direct consequence of Corollary 1. Item (2) follows by a successive application of (1) for m = 2, 3, and so on. Finally, (3) is an immediate consequence of (2), applied for f˜ = J x˜ . If the spectrum of J is resonant, then using the adJx operator we can get rid of all nonresonant terms, which leads to the following: THEOREM 2
Consider the differential equation x˙ = f (x) = Jx +
∞
f [m] (x)
m=2
Assume that J is diagonal, that is, J = diag(λ 1 , . . . , λn ). There exists a formal [m] (x) bringing x ˙ = f (x) invertible transformation of the form x˜ = x + ∞ m=2 φ into x˙˜ = f˜ (˜x) of the form f˜j (˜x) = λj x˜ j +
k∈Rj
k
γjk x˜ 11 · · · x˜ nkn
where γjk ∈ R and the summation is taken over all resonances k = (k1 , . . . , kn ) forming the resonant set Rj associated with λj . If the eigenvalues of J are distinct but not necessarily real, then an analogous result holds (which will be stated it in Section 4.7). Theorem 1 and Theorem 2 summarize Poincaré’s approach in the formal category. The idea of this approach is very natural: in order to establish the equivalence of two dynamical systems, we replace the singular partial differential equation (DE) by an infinite sequence of homological equations (HE), which are simply linear equations with respect to the unknown components of the homogenous part φ [m] of φ. Much more delicate and difficult issues of constructing C∞ -smooth or real analytical transformations that linearize the equation (in the nonresonant case) or annihilate all nonresonant terms (in the general case) are discussed very briefly in Section 4.9.
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
4.3
Normal Forms for Single-Input Systems with Controllable Linearization
4.3.1
151
Introduction
In this section, we will study nonlinear single-input control-affine systems of the form : ξ˙ = f (ξ ) + g(ξ )u where ξ ∈ X, an open subset of Rn , u ∈ R, and f and g are C∞ -smooth vector fields on X. Throughout this section we will study the system around a point ξ0 at which f (ξ0 ) = 0 and g(ξ0 ) = 0. Without loss of generality, we will assume that ξ0 = 0. We will also assume throughout this section that the linear part (F, G) of the system is controllable, where F = (∂f /∂ξ )(0) and G = g(0). The goal of this section is to obtain a normal form of under the action of the feedback group consisting of feedback transformation of the form :
x = φ(ξ ) u = α(ξ ) + β(ξ )v
Together with the system and the feedback transformation , we will consider their Taylor series expansions ∞ and ∞ , respectively, and we will study the action of ∞ on ∞ step-by-step, that is, the action of the homogeneous part m of ∞ on the homogeneous part [m] of ∞ . In other words, we will generalize the approach that Poincaré has developed for dynamical systems (which we recalled in Section 4.2) to control systems. It was Kang and Krener [50, 51, 54] who proposed this approach in the context of control systems and who have obtained fundamental results. Their pioneering work has inspired the authors who have obtained further results, and all of them form a relatively complete theory of formal feedback classification of nonlinear control systems. The first results of Kang and Krener were devoted to obtaining a normal form for single-input controlaffine systems with controllable linear approximation and we will also start our systematic presentation in this section by discussing that case. A generalization to non-affine systems will be given at the end of this section while further developments (uncontrollable linear approximation and the problem of canonical forms) will be discussed in next sections. This section is organized as follows. In Section 4.3.2, we will introduce the notation, used in the whole section as well as in Section 4.4 to Section 4.6. The main results are given in Section 4.3.3: a normal form for homogeneous systems, explicit transformations bringing to it, m-invariants, and normal
0882-Perruquetti-ch04_R2_180805
152
Feedback Equivalence of Nonlinear Control Systems
form under formal feedback. Finally, in Section 4.3.4, we will generalize the normal form to non-affine systems.
4.3.2
Notations
P[m] (ξ ) denotes the space of homogeneous polynomials of degree m of the variables ξ1 , . . . , ξn ; P≤m (ξ ) the space of polynomials of degree m of the variables ξ1 , . . . , ξn ; and P≥m (ξ ) the space of formal power series of the variables ξ1 , . . . , ξn starting from terms of degree m. Analogously, V [m] (ξ ) denotes the space of homogeneous vector fields whose components are in P[m] (ξ ); V ≤m the space of polynomial vector fields whose components are in P≤m (ξ ); and V ≥m (ξ ) the space of vector fields formal power series whose components are in P≥m (ξ ). Notations P[m] (ξ , u), V [m] (ξ , u) represent, respectively, homogeneous polynomials and homogeneous polynomial vector fields depending on the state variables ξ = (ξ1 , . . . , ξn ) and control variable u, with homogeneity being understood with respect to the all variables (ξ , u). Because of various normal forms and various transformations that are used throughout the paper, we will maintain the following notation. Together with , we will also consider its infinite Taylor series expansion ∞ and its homogeneous part [m] of degree m given, respectively, by the following systems ∞ : ξ˙ = Aξ + Bu +
∞
( f [k] (ξ ) + g[k−1] (ξ )u)
k=2
[m] : ξ˙ = Aξ + Bu + f [m] (ξ ) + g[m−1] (ξ )u The systems , [m] , and ∞ will stand for the systems under consideration. Their state vector will be denoted by ξ and their control by u (x and v being used, respectively, for the state and control of various normal forms). The system [m] (resp. ∞ ) transformed via feedback will be denoted by ˜ [m] (resp. ˜ ∞ ). Its state vector will be denoted by x, its control by v, and the vector fields, defining its dynamics, by f˜ [k] and g˜ [k−1] . Feedback equiv˜ [m] will be established via a alence of homogeneous systems [m] and smooth feedback, specifically by homogeneous feedback m . On the other ˜ ∞ will be established via hand, feedback equivalence of systems ∞ and ∞ a formal feedback . We will introduce two kinds of normal forms: Kang normal forms and dual normal forms (Section 4.3 and Section 4.5), as well as canonical forms and dual canonical forms (Section 4.4 and Section 4.6). The symbol “bar” will correspond to the vector field f¯ [m] defining the Kang normal
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
153
[m] ∞ and the canonical form ∞ as well as to the vecforms NF and NF CF [m] ∞ tor field g¯ [m−1] defining the dual normal forms DNF and DNF and the ∞ dual canonical form DCF . Analogously, the m-invariants (resp. dual m) and invariants) of the system [m] will be denoted by a[m]j,i+2 (resp. b[m−1] j [m] (resp. the m-invariants (resp. dual m-invariants) of the normal form NF [m] dual normal form DNF ) by a¯ [m]j,i+2 (resp. b¯ [m−1] ). Other normal forms will j be discussed in Section 4.12.
4.3.3
Normal Form and m-Invariants
All objects, that is, functions, maps, vector fields, control systems, etc., are considered in a neighborhood of 0 ∈ Rn and assumed to be C∞ -smooth. Let h be a smooth R-valued function. By h(ξ ) = h[0] (ξ ) + h[1] (ξ ) + h[2] (ξ ) + · · · =
∞
h[m] (ξ )
m=0
we denote its infinite Taylor series expansion at 0 ∈ Rn , where h[m] (ξ ) stands for a homogeneous polynomial of degree m. Similarly, for a map φ of an open subset of Rn to Rn (resp. for a vector field f on an open subset of Rn ), we will denote by φ [m] (resp. f [m] ) the homogeneous term of degree m of its Taylor series expansion at 0 ∈ Rn , that is, each component φj[m] of φ [m] (resp. fj[m] of f [m] ) is a homogeneous polynomial of degree m in ξ . Consider the Taylor series expansion of the system given by ∞ : ξ˙ = Fξ + Gu +
∞
f [m] (ξ ) + g[m−1] (ξ )u
(4.2)
m=2
where F = (∂f /∂ξ )(0) and G = g(0). Recall that we assume in this section that f (0) = 0 and g(0) = 0. Consider also the Taylor series expansion ∞ of the feedback transformation given by x = Tξ + ∞ :
∞
φ [m] (ξ )
m=2
u = Kξ + Lv +
∞
α [m] (ξ ) + β [m−1] (ξ )v
m=2
(4.3)
0882-Perruquetti-ch04_R2_180805
154
Feedback Equivalence of Nonlinear Control Systems
where T is an invertible matrix and L = 0. Analogously to the Poincaré’s approach presented in Section 4.2, we analyze the action of ∞ on the system ∞ step by step. To start with, consider the linear system ξ˙ = Fξ + Gu Throughout the section we will assume that it is controllable. It can be thus transformed by a linear feedback transformation of the form 1 :
x = Tξ u = Kξ + Lv
into the Brunovský canonical form (A, B) [49] and Example 1 in Section 4.1:
0
A= 0 0
1
··· ..
.
0
···
0
···
0 , 1 0
0 . . . B= 0 1
Assuming that the linear part (F, G), of the system ∞ given by (4.2), has been transformed to the Brunovský canonical form (A, B), we follow an idea of Kang and Krener [50, 54] and apply successively a series of transformations m :
x = ξ + φ [m] (ξ ) u = v + α [m] (ξ ) + β [m−1] (ξ )v
(4.4)
for m = 2, 3, . . . . A feedback transformation defined as an infinite series of successive compositions of m , m = 1, 2, . . . is also denoted by ∞ (i.e., ∞ = · · · m ◦ m−1 ◦ · · · ◦ 1 ) because, as a formal power series, it is of the form (4.3). We will not address the problem of convergence in general (see Section 4.9 and Section 4.13 for some comments on this issue and for a convergent class of analytic systems) and we will call such a series of successive compositions a formal feedback transformation. Observe that each transformation m , for m ≥ 2, leaves invariant all homogeneous terms of degree smaller than m of the system ∞ and we will call m a homogeneous feedback transformation of degree m. We will study the action of m on the following homogeneous system [m] : ξ˙ = Aξ + Bu + f [m] (ξ ) + g[m−1] (ξ )u
(4.5)
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
155
˜ [m] given by Consider another homogeneous system ˜ [m] : x˙ = Ax + Bv + f˜ [m] (x) + g˜ [m−1] (x)v
(4.6)
We will say that the homogeneous system [m] is feedback equivalent ˜ [m] if there exists a homogeneous feedback to the homogenous system m ˜ [m] modulo transformation of the form (4.4), which brings [m] into ≥m+1 terms in V (x, v). The starting point for formal classification of single-input control systems is the following result, proved by Kang [50]. PROPOSITION 2
The homogeneous feedback transformation m , defined by (4.4), brings the system ˜ [m] , given by (4.6), if and only if the following relations [m] , given by (4.5), into
[m] LAξ φj[m] − φj+1 (ξ ) = f˜j[m] (ξ ) − fj[m] (ξ )
LB φj[m] (ξ ) = g˜ j[m−1] (ξ ) − gj[m−1] (ξ ) LAξ φn[m] + α [m] (ξ ) = f˜n[m] (ξ ) − fn[m] (ξ )
(4.7)
LB φn[m] (ξ ) + β [m−1] (ξ ) = g˜ n[m−1] (ξ ) − gn[m−1] (ξ )
hold for any 1 ≤ j ≤ n − 1, where φj[m] are the components of φ [m] . This proposition represents the essence of the method developed by Kang and Krener and has been used for many results in this chapter. The problem of studying the feedback equivalence of two control-affine ˜ requires, in general, solving the system (CDE) of firstsystems and order partial differential equations (as we have already explained in Section 4.1). On the other hand, if we perform the analysis step by step, then the problem of establishing the feedback equivalence of two systems [m] ˜ [m] reduces to solving the algebraic system (4.7), called sometimes the and control homological equation by its analogy with Poincaré’s homological equation (HE) of Section 4.2. Indeed, (4.7) can be re-written in the following compact from adAξ φ [m] (ξ ) = f˜ [m] (ξ ) − f [m] (ξ ) − Bα [m] (ξ ) adB[m] (ξ ) = g˜ [m−1] (ξ ) − g[m−1] (ξ ) − Bβ [m−1] (ξ )
(CHE)
which reduces to (HE) if the control vector field B + g[m−1] (ξ ) is not present, with A playing the role of J. Therefore for control systems, solving the
0882-Perruquetti-ch04_R2_180805
156
Feedback Equivalence of Nonlinear Control Systems
differential equation (CDE) is replaced by an infinite sequence of algebraic homological equations (CHE) exactly like for dynamical systems, where the differential equation (DE) is replaced by an infinite sequence of homological equations (HE) (compare Section 4.2). Using Proposition 2, Kang [50] proved the following: THEOREM 3
The homogeneous system [m] can be transformed, via a homogeneous feedback transformation m , into the following normal form [m−2] x˙ 1 = x2 + ni=3 xi2 P1,i (x1 , . . . , xi ) .. . n 2 [m−2] (x , . . . , x ) 1 i x˙ j = xj+1 + i=j+2 xi Pj,i [m] NF : (4.8) .. . [m−2] x˙ n−2 = xn−1 + xn2 Pn−2,n (x1 , . . . , xn ) x˙ n−1 = xn x˙ = v n [m−2] (x1 , . . . , xi ) are homogeneous polynomials of degree m − 2 depending where Pj,i on the indicated variables.
To illustrate this result, consider the case m = 2, which actually was, for Kang and Krener [54], the starting point for the formal approach to feedback equivalence. Applying Theorem 3 to m = 2 yields that the homogeneous system [2] can be transformed, via a homogeneous feedback transformation 2 , into the following normal form: x˙ 1 = x2 + a1,3 x32 + a1,4 x42 + · · · + a1,n xn2 x˙ 2 = x3 + a2,4 x42 + · · · + a2,n xn2 .. [2] . NF : ˙ x + an−2,n xn2 n−2 = xn−1 + an−1,x xn2 x˙ n−1 = xn x˙ n = u [m] where aj,i ∈ R. Notice that the general normal form NF exhibits the [2] same triangular triangular structure as NF , the only difference being the [m−2] (x1 , . . . , xi ). replacement of the constants aj,i by the polynomials Pj,i
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
157
Now we will compute the number of constants aj,i (for m = 2) and that of the polynomials (in the general case) present in the normal forms. Compare the analysis given subsequently (performed for the homogeneous system [m] ) with a similar analysis given for general multi-input systems and control-affine systems in Section 4.1. Recall that the dimension of the space of polynomials P[m] of degree m of n variables and of the space V [m] of polynomial vector fields on Rn , all of whose components belong to P[m] , are, respectively (n + m − 1)! m!(n − 1)!
and n
(n + m − 1)! m!(n − 1)!
Homogeneous systems [m] are given by two vector fields f [m] ∈ V [m] and g[m−1] ∈ V [m−1] . Therefore, the dimension of the space of single-input systems, homogenous of degree m, is d [m] = n
(n + m − 2)! (n + m − 1)! +n m!(n − 1)! (m − 1)!(n − 1)!
The feedback group m is given by n components of the diffeomorphism φ [m] , each in P[m] , and two functions α [m] ∈ P[m] and β [m−1] ∈ P[m−1] . Hence the dimension of m is d m = n
(n + m − 2)! (n + m − 1)! (n + m − 1)! + + m!(n − 1)! m!(n − 1)! (m − 1)!(n − 1)!
Both dimensions are polynomials of degree n − 1 of m and their difference is thus also a polynomial of degree n − 1 of m starting with d [m] − d m =
n − 2 n−1 m + ··· , (n − 1)!
where dots stand for lower order terms. Observe that the dimension of the space of n − 2 functions, each belonging to P[m] , is also a polynomial of degree n − 1 of m starting with (n − 2)
(n + m − 1)! n − 2 n−1 = m + ··· m!(n − 1)! (n − 1)!
[m] which explains why in the normal form NF we have n − 2 polynomials of n variables. Since
d [m] − d m < (n − 2)
(n + m − 1)! m!(n − 1)!
0882-Perruquetti-ch04_R2_180805
158
Feedback Equivalence of Nonlinear Control Systems
it follows that polynomials of fewer variables show up in the normal form [m] . An analogous argument applied to m tending to infinity explains the NF ∞ (see appearance of n − 2 functions of n variables in the normal form NF Theorem 6). To calculate the exact number of invariants in the form [m] (which is bounded from below by d [m] − d m ), we have to study the action of m on the space of homogeneous systems of degree m. This action is not free, the isotropy group being of dimension 1 [50, 83] (see also Proposition 3 for a detailed calculation). This can be illustrated by the homogeneous system [2] of degree 2, for which d [2] = n(n(n + 1))/2 + nn (we have n components of f [2] and n components of g[1] ) and d 2 = n(n(n + 1))/2 + (n(n + 1))/2 + n (we have n components of φ [2] and the function α [2] and β [1] ). It follows that d [2] − d 2 = (n2 − 3n)/2 while the number of parameters aj,i (which is actually the number of invariants of [2] , see the next section) is ((n − 1)(n − 2))/2. The difference ((n − 1)(n − 2))/2 − (n2 − 3n)/2 = 1 is actually the dimension of the isotropy subgroup of 2 , which is the dimension of the group of symmetries of any [2] (see Section 4.11). [m] are The two following questions concerning the normal form NF important and arise naturally: [m−2] invariant, that is, unique under 1. Are the polynomials Pj,i m feedback ? [m] 2. How to bring a given system [m] into its normal form NF ?
The answer to question 1 is positive, and to construct invariants under homogeneous feedback transformations, define the vector fields Xim−1 (ξ ) = (−1)i adiAξ +f [m] (ξ ) (B + g[m−1] (ξ )) and let Xi[m−1] be its homogeneous part of degree m − 1. By πi we will denote the projection on the subspace Wi = {ξ = (ξ1 , . . . , ξn )T ∈ Rn : ξi+1 = · · · = ξn = 0} that is πi (ξ ) = (ξ1 , . . . , ξi , 0, . . . , 0) Following Kang [50], we denote by a[m]j,i+2 (ξ ) the homogeneous part of degree m − 2 of the polynomials m−1 CAj−1 Xim−1 , Xi+1 (πn−i (ξ )) = CAj−1 i+1 [m−1] × adAi B Xi+1 − adA B Xi[m−1] (πn−i (ξ ))
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
159
where C = (1, 0, . . . , 0)T ∈ Rn and ( j, i) ∈ ⊂ N × N, defined by = {( j, i) ∈ N × N : 1 ≤ j ≤ n − 2, 0 ≤ i ≤ n − j − 2} The homogeneous polynomials a[m]j,i+2 , for ( j, i) ∈ , will be called m-invariants of [m] , under the action of m . The following result of Kang [50] asserts that m-invariants a[m]j,i+2 , for ( j, i) ∈ , are complete invariants of homogeneous feedback and, moreover, illustrates their meaning for the homogeneous normal [m] . form NF ˜ [m] and let Consider two homogeneous systems [m] and { a[m]j,i+2 : ( j, i) ∈ },
and {˜a[m]j,i+2 : ( j, i) ∈ }
denote, respectively, their m-invariants. The following result was proved by Kang [50]: THEOREM 4
The m-invariants have the following properties: ˜ [m] are equivalent via a homo1. Two homogeneous systems [m] and m geneous feedback transformation if and only if a[m]j,i+2 = a˜ [m]j,i+2 ,
for any ( j, i) ∈
[m] , defined by (4.8), are 2. The m-invariants a¯ [m]j,i+2 of the normal form NF given by
a¯ [m]j,i+2 (x) =
∂2 2 ∂xn−i
[m−2] 2 xn−i Pj,n−i (x1 , . . . , xn−i ),
for any ( j, i) ∈ (4.9)
To answer question 2, we will construct an explicit feedback transfor[m] . mation that brings the homogeneous system [m] to its normal form NF [m−1] [m−1] (ξ ) by setting ψj,0 (ξ ) = Define the homogeneous polynomials ψj,i [m−1] (ξ ) = 0, ψ1,1
[m−1] ψj,i (ξ )
= −CA
j−1
[m−1] adn−i Aξ g
+
n−i t=1
(−1)
t
[m] adt−1 Aξ adAn−i−t B f
0882-Perruquetti-ch04_R2_180805
160
Feedback Equivalence of Nonlinear Control Systems
if 1 ≤ j < i ≤ n and [m−1] [m] [m−1] (ξ ) = LAn−i B fj−1 (πi (ξ )) + LAξ ψj−1,i (πi (ξ )) ψj,i ξi [m−1] [m−1] + ψj−1,i−1 (πi−1 (ξ )) + LAn−i+1 B ψj−1,i (πi (ξ )) dξi
(4.10)
0
[m−1] [m−1] (πi (ξ )) is the restriction of ψj,i (ξ ) to the subif 1 ≤ i ≤ j, where ψj,i
space Wi . Define the components φj[m] of φ [m] , for 1 ≤ j ≤ n, and the feedback (α [m] , β [m−1] ) by φj[m] (ξ )
=
n i=1
ξi
0
[m−1] ψj,i (πi (ξ )) dξi ,
1≤j ≤n−1
[m] [m] φn[m] (ξ ) = fn−1 (ξ ) + LAξ φn−1 (ξ ) α [m] (ξ ) = − fn[m] (ξ ) + LAξ φn[m] (ξ ) β [m−1] (ξ ) = − gn[m−1] (ξ ) + LB φn[m] (ξ )
(4.11)
We have the following result [83]: THEOREM 5
The homogeneous feedback transformation m
:
x = ξ + φ [m] (ξ ) u = v + α [m] (ξ ) + β [m−1] (ξ )v
where α [m] , β [m−1] , and the components φj[m] of φ [m] are defined by (4.11), brings
[m] the homogeneous system [m] into its normal form NF given by (4.8).
Example 2
To illustrate the results of this section, we consider the system [m] , given by (4.5) on R3 . Theorem 3 implies that the system [m] is equivalent, via a homogeneous feedback transformation m defined by (4.11), to its normal [m] (see (4.8)) form NF x˙ 1 = x2 + x32 P[m−2] (x1 , x2 , x3 ) x˙ 2 = x3 x˙ 3 = v where P[m−2] (x1 , x2 , x3 ) is a homogeneous polynomial of degree m − 2 of the variables x1 , x2 , x3 .
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
161
As we have already mentioned, Poincaré’s method allows to replace the partial differential equation (CDE) (given in Section 4.1) by solving successively linear algebraic equations defined by the control homological equation (CHE) [50, 54] and Proposition 2. The solvability of this equation was proved earlier [50, 54] while Theorem 5 provides an explicit solution (in the form of the transformations (4.11) that are easily computable via differentiation and integration of homogeneous polynomials) to the control homological equation. Consequently, for any given control system, Theorem 5 gives transformations bringing the homogeneous part of the system into its normal form. For example, if the system is feedback linearizable, up to order m0 − 1 [56], then a diffeomorphism and a feedback compensating all nonlinearities of degree lower than m0 can be calculated explicitly without solving partial differential equations (compare Section 4.9). More generally, by a successive application of transformations given by (4.11) we can bring the system, without solving partial differential equations, to its normal form given in Theorem 6. Consider the system ∞ of the form (4.2) and recall that we assume the linear part (F, G) to be controllable. Apply successively to ∞ a series of transformations m , m = 1, 2, 3, . . ., such that each m brings [m] to its nor[m] . More precisely, bring (F, G) into the Brunonvský canonical mal form NF form (A, B) via a linear feedback 1 and denote ∞,1 = ∗1 ( ∞ ). Assume that a system ∞,m−1 has been defined. Let m be a homogeneous feedback transformation transforming [m] , which is the homogeneous part of [m] ( m can be taken, for instance, degree m of ∞,m−1 , to the normal form NF as the transformations defined by (4.11)). Define ∞,m = ∗m ( ∞,m−1 ). Notice that we apply m to the whole system ∞,m−1 (and not only to its homogeneous part [m] ). Successive iteration of Theorem 3 gives the following result of Kang [50]. THEOREM 6
There exists a formal feedback transformation ∞ which brings the system ∞ ∞ given by to a normal form NF
∞ NF
x˙ 1 = x2 + ni=3 xi2 P1,i (x1 , . . . , xi ) .. . x˙ j = xj+1 + ni=j+2 xi2 Pj,i (x1 , . . . , xi ) .. : . x˙ n−2 = xn−1 + xn2 Pn−2,n (x1 , . . . , xn ) x˙ n−1 = xn x˙ n = v
(4.12)
0882-Perruquetti-ch04_R2_180805
162
Feedback Equivalence of Nonlinear Control Systems
where Pj,i (x1 , . . . , xi ) are formal power series depending on the indicated variables.
Example 3
Consider a system defined on R3 whose linear part is controllable (compare Example 2). Theorem 6 implies that the system is equivalent, via a ∞ formal feedback transformation ∞ , to its normal form NF x˙ 1 = x2 + x32 P(x1 , x2 , x3 ) x˙ 2 = x3 x˙ 3 = v where P(x1 , x2 , x3 ) is a formal power series of the variables x1 , x2 , x3 .
4.3.4
Normal Form for Non-affine Systems
[m] ∞ to genIn this section, we will generalize normal forms NF and NF eral systems. As we explained in Section 4.1, such a generalization can be performed using Proposition 1. Consider a general control system of the form
: ξ˙ = F(ξ , u) around an equilibrium point (ξ0 , u0 ), that is, F(ξ0 , u0 ) = 0. Without loss of generality, we can assume that (ξ0 , u0 ) = (0, 0). Together with we will consider its infinite Taylor series expansion ∞ : ξ˙ = Fξ + Gu +
∞
F[m] (ξ , u)
m=2
where F[m] (ξ , u) stands for homogeneous terms of degree m and homogeneity is understood in this section with respect to the state and control variables together. Consider the feedback transformation ϒ (compare Section 4.1) x = φ(ξ ) ϒ:
v = ψ(ξ , u)
0882-Perruquetti-ch04_R2_180805
4.3
Single-Input Systems with Controllable Linearization
163
and its Taylor series expansion ϒ ∞ given by x = Tξ +
∞
φ [m] (ξ )
m=2
ϒ∞ :
v = Kξ + Lu +
∞
ψ [m] (ξ , u)
m=2
where T is an invertible matrix and L = 0. We will assume throughout this section that the pair (F, G) is controllable and so we can suppose that it is in the Brunovský canonical form (A, B). Like in the control-affine case, we will consider the action of the homogenous part ϒ m of ϒ ∞ given by ϒ
m
:
x = ξ + φ [m] (ξ ) v = u + ψ [m] (ξ , u)
on the homogeneous part [m] of ∞ given by [m] : ξ˙ = Aξ + Bu + F[m] (ξ , u) Combining Theorem 3 with Proposition 1 leads to the following result: THEOREM 7
The general homogeneous system [m] can be transformed, via a homogeneous feedback transformation ϒ m , into the following normal form
[m] NF
[m−2] (x1 , . . . , xi ) + v2 P1[m−2] (x1 , . . . , xn , v) x˙ 1 = x2 + ni=3 xi2 P1,i .. . [m−2] x˙ j = xj+1 + ni=j+2 xi2 Pj,i (x1 , . . . , xi ) + v2 Pj[m−2] (x1 , . . . , xn , v) .. : . [m−2] [m−2] x˙ n−2 = xn−1 + xn2 Pn−2,n (x1 , . . . , xn ) + v2 Pn−1 (x1 , . . . , xn , v) x˙ n−1 = xn + v2 Pn[m−2] (x1 , . . . , xn , v) x˙ n = v (4.13)
[m−2] where Pj,i (x1 , . . . , xi ) and Pj[m−2] (x1 , . . . , xn , v) are homogeneous polynomials of degree m − 2 depending on the indicated variables.
0882-Perruquetti-ch04_R2_180805
164
Feedback Equivalence of Nonlinear Control Systems
Notice that formally the aforementioned normal form can be obtained [m] and apply the reducas follows. Consider the affine normal form NF tion defined as the inverse of the extension (preintegration) described just [m] is controlled by xn , before Proposition 1. More precisely, assume that NF so skip the last equation x˙ n = v and denote xn by v. What we obtain is an (n − 1)-dimensional system, nonlinear with respect to v, which actually [m] . gives the (n − 1)-dimensional form NF Like in the control-affine case, a successive application of Theorem 7 ∞ gives a formal normal form for ∞ NF under ϒ . It has the same structure [m] [m−2] as NF , the only difference being that the polynomials Pj,i (x1 , . . . , xi )
and Pj[m−2] (x1 , . . . , xn , v) are replaced by formal power series of the same variables. We will end up with a simple example, which, actually, is a nonaffine version of Example 2 and Example 3.
Example 4
Consider the general system [m] on R2 . Theorem 6 implies that the system [m] is equivalent, via a homogeneous feedback transformation ϒ m to its [m] , see (4.13): normal form NF x˙ 1 = x2 + v2 P1[m−2] (x1 , x2 , v) x˙ 2 = v where P1[m−2] (x1 , x2 , v) is a homogeneous polynomial of degree m − 2 of the variables x1 , x2 , and v. Consequently, the general system ∞ on R2 is equivalent, via a formal feedback transformation ϒ ∞ to its normal form ∞ NF : x˙ 1 = x2 + v2 P1 (x1 , x2 , v) x˙ 2 = v where P1 (x1 , x2 , v) is a formal power series of the variables x1 , x2 , and v.
4.4
Canonical Form for Single-Input Systems with Controllable Linearization
[m] As proved by Kang and recalled in Theorem 4, the normal form NF is m unique under homogeneous feedback transformation . The normal form
0882-Perruquetti-ch04_R2_180805
4.4
Canonical Form for Single-Input Systems
165
∞ is constructed by a successive application of homogeneous transNF formations m , for m ≥ 1, which bring the corresponding homogeneous [m] . Therefore, a natural and funsystems [m] into their normal forms NF damental question which arises is whether the system ∞ can admit two different normal forms, that is, whether the normal forms given by Theorem 6 are in fact canonical forms under a general formal feedback transformations of the form ∞ . It turns out that a given system can admit different normal forms, as shown in the following example of Kang ∞ is [50]. The main reason for the nonuniqueness of the normal form NF [m] that, although the normal form NF is unique, homogeneous feedback [m] transformation m bringing [m] into NF is not. It is this small group [m] of homogeneous feedback transformations of order m that preserve NF ∞ (described by Proposition 3), which causes the nonuniqueness of NF .
Example 5 Consider the following system ξ˙1 = ξ2 + ξ32 − 2ξ1 ξ32 ξ˙2 = ξ3
(4.14)
ξ˙3 = u on R3 . Clearly, this system is in Kang normal form (compare with ∞ . The feedback transformation Theorem 6), say 1,NF 4 x1 = ξ1 − ξ12 − ξ23 3 ≤3 :
x2 = ξ2 − 2ξ1 ξ2 x3 = ξ3 − 2 ξ22 + ξ1 ξ3 − 2ξ2 ξ32
u = v + 6ξ2 ξ3 + 12ξ1 ξ2 ξ3 − 4ξ33 + 2 ξ1 + 2ξ12 + 2ξ2 ξ3 v
brings the system (4.14) into the form x˙ 1 = x2 + x32 x˙ 2 = x3 x˙ 3 = v modulo terms in V ≥4 (x, v). Applying successively homogeneous feedback transformations m given, for any m ≥ 4, by (4.11), we transform the
0882-Perruquetti-ch04_R2_180805
166
Feedback Equivalence of Nonlinear Control Systems
∞ : aforementioned system into the following normal form 2,NF
x˙ 1 = x2 + x32 + x32 P(x) x˙ 2 = x3
(4.15)
x˙ 3 = v where P is a formal power series whose 1-jet at 0 ∈ R3 vanishes. The systems ∞ and ∞ , respectively) (4.14) and (4.15) are in their normal forms (1,NF 2,NF and, moreover, the systems are feedback equivalent, but the system (4.15) does not contain any term of degree 3. As a consequence, the normal form ∞ is not unique under feedback transformations. NF A natural and important problem is thus to construct a canonical form and the aim of this section is indeed to construct a canonical form for ∞ under feedback transformation ∞ . Consider the system ∞ of the form ∞ : ξ˙ = Fξ + Gu +
∞
f [m] (ξ ) + g[m−1] (ξ )u
(4.16)
m=2
Since its linear part (F, G) is assumed to be controllable, we bring it, via a linear transformation and linear feedback, to the Brunovský canonical form (A, B). Let the first homogeneous term of ∞ which cannot be annihilated by a feedback transformation be of degree m0 . As proved by Krener [56], the degree m0 is given by the largest integer such that all distributions Dk = span { g, . . . , adk−1 g}, for 1 ≤ k ≤ n − 1, are involutive modulo terms f of order m0 − 2. We can thus, due to Theorem 3 and Theorem 4, assume that, after applying a suitable feedback ≤m0 , the system ∞ takes the form ξ˙ = Aξ + Bu + f¯ [m0 ] (ξ ) +
∞
f [m] (ξ ) + g[m−1] (ξ )u
m=m0 +1
where (A, B) is in Brunovský canonical form and the first nonvanishing homogeneous vector field f¯ [m0 ] is in the normal form (by Theorem 3) with components given by 2 [m0 −2] (ξ , . . . , ξ ), n 1≤j ≤n−2 1 i i=j+2 ξi Pj,i [m ] f¯j 0 (ξ ) = 0, n−1≤j ≤n Let (i1 , . . . , in−s ), where i1 + · · · + in−s = m0 and in−s ≥ 2, be the largest, in the lexicographic ordering, (n − s)-tuple of nonnegative integers such that
0882-Perruquetti-ch04_R2_180805
4.4
Canonical Form for Single-Input Systems
167
for some 1 ≤ j ≤ n − 2, we have [m0 ]
∂ m0 f¯j
i
i
n−s ∂ξ11 · · · ∂ξn−s
Define
= 0
[m ] ∂ m0 f¯j 0
= 0 j∗ = sup j = 1, . . . , n − 2 : i in−s ∂ξ11 · · · ∂ξn−s The following results, whose proofs are detailed elsewhere [83], describe the canonical form obtained by the authors. THEOREM 8
The system ∞ given by (4.16) is equivalent by a formal feedback ∞ to a system of the form ∞ CF : x˙ = Ax + Bv +
∞
f¯ [m] (x)
m=m0
where, for any m ≥ m0 , the components f¯j[m] (x) of f¯ [m] (x) are given by f¯j[m] (x) =
n
1≤j ≤n−2
0,
n−1≤j ≤n
2 [m−2] (x , . . . , x ), 1 i i=j+2 xi Pj,i
(4.17)
additionally, we have [m0 ]
∂ m0 f¯j∗
= ±1
(4.18)
(x1 , 0, . . . , 0) = 0.
(4.19)
i
i
n−s ∂x11 · · · ∂xn−s
and, moreover, for any m ≥ m0 + 1 ∂ m0 f¯j[m] ∗ i
i
n−s ∂x11 · · · ∂xn−s
∞ satisfying (4.17)–(4.19) will be called the canonical form The form CF ∞ of . The name is justified by the following theorem.
THEOREM 9
Two systems 1∞ and 2∞ are formally feedback equivalent if and only if their ∞ and ∞ coincide. canonical forms 1,CF 2,CF
0882-Perruquetti-ch04_R2_180805
168
Feedback Equivalence of Nonlinear Control Systems
Kang [50], generalizing [54], proved that any system ∞ can be brought ∞ , for which (4.17) is satisfied. by a formal feedback into the normal form NF He also observed that his normal forms are not unique (see Example 5). Our results (Theorem 8 and Theorem 9) complete his study. We show that for each degree m of homogeneity we can use a one-dimensional subgroup of feedback transformations which preserves the “triangular” structure of (4.17) and at the same time allows us to normalize one higher order term. The form of (4.18) and (4.19) is a result of this normalization. These one-dimensional subgroups of feedback transformations are given by the following proposition. PROPOSITION 3
The transformation m given by (4.4) leaves the system [m] defined by (4.5) invariant if and only if φj[m] = am LAξ ξ1m , j−1
1≤j≤n
α [m] = −am LnAξ ξ1m
(4.20)
m β [m−1] = −am LB Ln−1 Aξ ξ1
where am is an arbitrary real parameter. Theorem 8 establishes an equivalence of the system ∞ with its canonical ∞ via a formal feedback. Its direct corollary yields the following form CF result for equivalence under a smooth feedback of the form x = φ(ξ ) :
u = α(ξ ) + β(ξ )v
up to an arbitrary order. Indeed, we have the following: COROLLARY 2
Consider a smooth control system : ξ˙ = f (ξ ) + g(ξ )u For any positive integer k we have: 1. There exists a smooth feedback transforming , locally around 0 ∈ Rn , ≤k given by: into its canonical form CF ≤k CF : x˙ = Ax + Bv +
k m=m0
f¯ [m] (x)
0882-Perruquetti-ch04_R2_180805
4.4
Canonical Form for Single-Input Systems
169
modulo terms in V ≥k+1 (x, v), where the components f¯j[m] (x) of f¯ [m] (x), for any m0 ≤ m ≤ k, satisfy (4.17)–(4.19). ≤k , modulo terms in V ≥k+1 (x, v), can be 2. Feedback equivalence of and CF established via a polynomial feedback transformation ≤k of degree k. 3. Two smooth systems 1 and 2 are feedback equivalent modulo terms in ≤k ≤k and 2,CF coincide. V ≥k+1 (x, v) if and only if their canonical forms 1,CF
This corollary follows directly from Theorem 8 and Theorem 9. To end this section will illustrate our results by two examples.
Example 6 Let us reconsider the system given by Example 3. It is equivalent, via a formal feedback, to the normal form x˙ 1 = x2 + x32 P(x1 , x2 , x3 ) x˙ 2 = x3 x˙ 3 = v where P(x1 , x2 , x3 ) is a formal power series. Assume, for simplicity, that m0 = 2, which is equivalent to the following generic condition: g, adf g, and [g, adf g] are linearly independent at 0 ∈ R3 . This implies that we can express P = P(x1 , x2 , x3 ) as P = c + P1 (x1 ) + x2 P2 (x1 , x2 ) + x3 P3 (x1 , x2 , x3 ) where c = 0 and P1 (0) = 0. Observe that any P(x1 , x2 , x3 ) of the earlier form ∞ . To get the canonical form ∞ , we use Theorem 8 gives a normal form NF CF which assures the existence of a feedback transformation ∞ of the form x˜ = φ(x) v = α(x) + β(x)˜v which normalizes the constant c and annihilates the formal power series ∞ P1 (x1 ). More precisely, ∞ transforms into its canonical form CF ˜ x1 , x˜ 2 , x˜ 3 ) x˙˜ 1 = x˜ 2 + x˜ 32 P(˜ x˙˜ 2 = x˜ 3 x˙˜ 3 = v˜
0882-Perruquetti-ch04_R2_180805
170
Feedback Equivalence of Nonlinear Control Systems
˜ x1 , x˜ 2 , x˜ 3 ) is of the form where the formal power series P(˜ ˜ x1 , x˜ 2 , x˜ 3 ) = 1 + x˜ 2 P˜ 2 (˜x1 , x˜ 2 ) + x˜ 3 P˜ 3 (˜x1 , x˜ 2 , x˜ 3 ) P(˜ clearly showing a difference between the normal and canonical form: in the latter, the free term is normalized and the term depending on x1 is annihilated. Now, we give an example of constructing the canonical form for a physical model of a variable length pendulum.
Example 7 Consider the variable length pendulum of Bressan and Rampazzo [10] (see also [19]). We denote by ξ1 the length of the pendulum, by ξ2 its velocity, by ξ3 the angle with respect to the horizontal, and by ξ4 the angular velocity. The control u = ξ˙4 = ξ¨3 is the angular acceleration. The mass is normalized to 1. The equations are [10, 19]: ξ˙1 = ξ2 ξ˙2 = −g sin ξ3 + ξ1 ξ42 ξ˙3 = ξ4 ξ˙4 = u where g denotes the gravity. Note that if we suppose to control the angular velocity ξ4 = ξ˙3 , which is the case of Refs. [10, 19], then the system is threedimensional but the control enters nonlinearly. At any equilibrium point ξ0 = (ξ10 , ξ20 , ξ30 , ξ40 )T = (ξ10 , 0, 0, 0)T , the linear part of the system is controllable. Our goal is to produce, for the variable length pendulum, a normal form and the canonical form as well as to answer the question regarding whether the systems corresponding to various values of the gravity constant g are feedback equivalent. To get a normal form, put x1 = ξ1 x2 = ξ2 x3 = −g sin ξ3 x4 = −gξ4 cos ξ3 v = gξ42 sin ξ3 − ug cos ξ3
0882-Perruquetti-ch04_R2_180805
4.4
Canonical Form for Single-Input Systems
171
The system becomes x˙ 1 = x2 x1
x˙ 2 = x3 + x42
g2
− x32
x˙ 3 = x4 x˙ 4 = v ∞ , given by (4.12), which gives a normal form. Indeed, we rediscover NF with P1,3 = 0, P1,4 = 0, and
P2,4 =
x1 − x32
g2
∞ , first observe that m = 3. To bring the system to its canonical form CF 0 Indeed, the function x42 (x1 /(g2 − x32 )) starts with third-order terms, which corresponds to the fact that the invariants a[2]j,i+2 vanish for any 1 ≤ j ≤ 2 [1] and any 0 ≤ i ≤ 2 − j. The only nonzero component of f¯ [3] is f¯2[3] = x42 P2,4 . Hence j∗ = 2 and the only, and thus the largest, quadruplet (i1 , i2 , i3 , i4 ) of nonnegative integers, satisfying i1 + i2 + i3 + i4 = 3 and such that
∂ 3 f¯2[3] i
i
∂x11 · · · ∂x44
= 0
is (i1 , i2 , i3 , i4 ) = (1, 0, 0, 2). To normalize f2[3] , put x˜ i = a1 xi ,
1≤i≤4
v˜ = a1 v where a1 = 1/g. We get the following canonical form for the variable length pendulum x˙˜ 1 = x˜ 2 x˙˜ 2 = x˜ 3 + x˜ 42
x˜ 1 1 − x˜ 32
x˙˜ 3 = x˜ 4 x˙˜ 4 = v˜ Independently of the value of the gravity constant g, all systems are feedback equivalent to each other.
0882-Perruquetti-ch04_R2_180805
172
4.5
Feedback Equivalence of Nonlinear Control Systems
Dual Normal Form and Dual m-Invariants
[m] In the normal form NF given by (4.8), all the components of the control [m−1] vector field g are annihilated and all nonremovable nonlinearities are grouped in f [m] . Kang and Krener in their pioneering paper [54] have shown that it is possible to transform, via a homogeneous transformation 2 of degree 2, the homogeneous system
[2] : ξ˙ = Aξ + Bu + f [2] (ξ ) + g[1] (ξ )u to a dual normal form. In this form, the components of the drift f [2] are annihilated while all nonremovable nonlinearities are, this time, present in g[1] . The aim of this section is to propose, for an arbitrary m, a dual normal form for the system [m] and a dual normal form for the system ∞ . On the one hand, our dual normal form generalizes, for higher order terms, that given in Ref. [54] for second-order terms, and, on the other [m] . The structure of this section will folhand, dualizes the normal form NF low that of Section 4.3: we will present the dual normal form, then we define and study dual m-invariants, and, finally, we give an explicit construction of transformations bringing the system into its dual normal form. For the proofs of all results contained in this section the reader is referred elsewhere [83]. Our first result asserts that we can always bring the homogeneous system [m] , given by (4.5), into a dual normal form. THEOREM 10
The homogeneous system [m] is equivalent, via a homogeneous feedback [m] given by transformations m , to the dual normal form DNF x˙ 1 = x2 [m−2] x˙ 2 = x3 + vxn Q2,n (x1 , . . . , xn ) .. . [m] [m−2] (4.21) DNF : x˙ = x + v n (x1 , . . . , xi ) j+1 j i=n−j+2 xi Qj,i .. . n [m−2] ˙ (x1 , . . . , xi ) x n−1 = xn + v i=3 xi Qj,i x˙ = v n
where Q[m−2] (x1 , . . . , xi ) are homogeneous polynomials of degree m − 2 dependj,i ing on the indicated variables.
0882-Perruquetti-ch04_R2_180805
4.5
Dual Normal Form and Dual m-Invariants
173
[2] for homogeneous systems of We will give the dual normal form DNF degree two:
x˙ 1 = x2 x˙ 2 = x3
+ vxn q2,n
.. . x˙ n−1 = xn + vx3 qn−1,3 + · · · + vxn qn−1,n x˙ n = v where qj,i ∈ R. The following example is a particular case of the previous system and helps illustrate Theorem 10.
Example 8
Consider the system [2] defined in R3 by ξ˙1 = ξ2 + ξ32 ξ˙2 = ξ3 ξ˙3 = u It is easy to check that the change of coordinates x1 = ξ1 , x2 = ξ2 + ξ32 , x3 = ξ3 , and x4 = ξ4 yields the dual normal form (n = 3, q2,3 = 2, and v = u) x˙ 1 = x2 x˙ 2 = x3 + 2x3 v x˙ 3 = v Now we will define dual m-invariants. To start with, recall that the homogeneous vector field Xi[m−1] is defined by taking the homogeneous part of degree m − 1 of the vector field Xim−1 = (−1)i adiAξ +f [m] (B + g[m−1] ). By Xi[m−1] (πi (ξ )) we will denote Xi[m−1] evaluated at the point πi (ξ ) = (ξ1 , . . . , ξi , 0, . . . , 0)T of the subspace Wi = {ξ = (ξ1 , . . . , ξn )T ∈ Rn : ξi+1 = · · · = ξn = 0}.
0882-Perruquetti-ch04_R2_180805
174
Feedback Equivalence of Nonlinear Control Systems
Consider the system [m] and for any j, such that 2 ≤ j ≤ n − 1, define the polynomial b[m−1] by setting j
b[m−1] j
=
gj[m−1]
+
j−1
j−k−1 LB LAξ fk[m]
−
n
j−1 LB LAξ
i=1
k=1
0
ξi
[m−1] CXn−i (πi (ξ )) dξi
The homogeneous polynomials b[m−1] , for 2 ≤ j ≤ n − 1, will be called the j dual m-invariants of the homogeneous system [m] . ˜ [m] of the forms (4.5) and (4.6). Let Consider two systems [m] and
b[m−1] : 2 ≤ j ≤ n − 1 , j
and
: 2 ≤ j ≤ n − 1 b˜ [m−1] j
denote, respectively, their dual m-invariants. The following result dualizes that of Theorem 4. THEOREM 11
The dual m-invariants have the following properties: ˜ [m] are equivalent via a homogeneous feedback 1. Two systems [m] and m transformation if and only if b[m−1] = b˜ [m−1] , j j
for any 2 ≤ j ≤ n − 1
[m] of the dual normal form DNF , defined by 2. The dual m-invariants b¯ [m−1] j (4.21), are given by
(x) = b¯ [m−1] j
n
xi Q[m−2] (x1 , . . . , xi ), j,i
for any 2 ≤ j ≤ n − 1
i=n−j+2
This result asserts that the dual m-invariants, similarly to m-invariants, form a set of complete invariants of the homogeneous feedback transformation. Notice, however, that the same information is encoded in both sets of invariants in different ways. [m] Like Theorem 4 for normal form NF , Theorem 11 shows that the poly[m−2] [m] defining the dual normal form DNF are unique nomial functions Qj,i
0882-Perruquetti-ch04_R2_180805
4.5
Dual Normal Form and Dual m-Invariants
175
under feedback transformation m . The question that remains is how to [m] . To this end, define bring a given system into its dual normal form DNF the following homogeneous polynomials
φ1[m]
=−
n i=1
[m] φj+1
α
[m]
=
fj[m]
=−
ξi 0
[m−1] CXn−i (πi (ξ )) dξi
+ LAξ φj[m] ,
fn[m]
1≤j ≤n−1
(4.22)
+ LAξ φn[m]
β [m−1] = − gn[m−1] + LB φn[m]
THEOREM 12
The feedback transformation
m
:
x = ξ + φ [m] (ξ ) u = v + α [m] (ξ ) + β [m−1] (ξ )v
where α [m] , β [m−1] , and the components φj[m] of φ [m] are defined by (4.22), brings
[m] given by (4.21). the system [m] into its dual normal form DNF
∞ . Consider the system Now our aim is to dualize the normal form NF of the form (4.16) and assume that its linear part (F, G) is controllable. Consider the system ∞ of the form (4.2) and recall that we assume the linear part (F, G) to be controllable. Apply a series of transformations m , m = 1, 2, 3, . . . successively to ∞ , such that each m brings [m] to its [m] . More precisely, bring (F, G) into the Brunonvský dual normal form DNF canonical form (A, B) via a linear feedback 1 and denote ∞,1 = ∗1 ( ∞ ). Assume that a system ∞,m−1 has been defined. Let m be a homogeneous feedback transformation transforming [m] , which is the homogeneous [m] (the transformapart of degree m of ∞,m−1 , to the dual normal form DNF m tion can be taken, for instance, as the transformations defined by (4.22)). Define ∞,m = ∗m ( ∞,m−1 ). Notice that we apply m to the whole system ∞,m−1 (and not only to its homogeneous part [m] ). Successive iteration of Theorem 12 gives the following dual normal form.
∞
0882-Perruquetti-ch04_R2_180805
176
Feedback Equivalence of Nonlinear Control Systems
THEOREM 13
The system ∞ can be transformed via a formal feedback transformation ∞ , into ∞ given by the dual normal form DNF
∞ DNF
x˙ = x2 1 x˙ 2 = x3 + vxn Q2,n (x1 , . . . , xn ) .. . : x˙ j = xj+1 + v ni=n−j+2 xi Qj,i (x1 , . . . , xi ) .. . x˙ n−1 = xn + v ni=3 xi Qj,i (x1 , . . . , xi ) x˙ n = v
(4.23)
where Qj,i (x1 , . . . , xi ) are formal power series depending on the indicated variables.
4.6
Dual Canonical Form
Similarly to normal forms, a given system can admit different dual normal forms. We are thus interested in constructing a dual canonical form (which ∞ in the same way as ∞ dualizes would dualize the canonical form CF DNF ∞ NF ). Assuming that the linear part (F, G) of the system ∞ , of the form (4.16), is controllable, we denote by m0 the degree of the first homogeneous term of the system ∞ which cannot be annihilated by a feedback transformation. Thus by Theorem 11 and Theorem 12 [using transformations (4.22)], we can assume, after applying a suitable feedback, that ∞ takes the form ∞ : ξ˙ = Aξ + Bu + g¯ [m0 −1] (ξ )u +
∞
f [m] (ξ ) + g[m−1] (ξ )u
m=m0 +1
where (A, B) is in Brunovský canonical form and the first nonvanishing homogeneous vector field g¯ [m0 −1] is in the dual normal form, compare (4.21), with components given by [m −1] g¯ j 0 (ξ )
=
n
2≤j ≤n−1
0,
j = 1 or j = n
[m0 −2] (ξ1 , . . . , ξi ), i=n−j+2 ξi Qj,i
0882-Perruquetti-ch04_R2_180805
4.6
Dual Canonical Form
177
Define [m −1] j∗ = inf j = 2, . . . , n − 1 : g¯ j 0 (ξ ) = 0 and let (i1 , . . . , in ), such that i1 + · · · + in = m0 − 1, be the largest n-tuple (in the lexicographic ordering) of nonnegative integers such that [m0 −1]
∂ m0 −1 g¯ j∗ i
∂ξ11 · · · ∂ξnin
= 0
We have the following theorem. THEOREM 14
There exists a formal feedback transformation ∞ which brings the system ∞ into the following form ∞ DCF : x˙ = Ax + Bv +
∞
g¯ [m−1] (x)v
m=m0
where for any m ≥ m0 , the components g¯ j[m−1] of g¯ [m−1] are given by g¯ j[m−1]
=
n
2≤j ≤n−1
0,
j = 1 or j = n
[m−2] (x1 , . . . , xi ), i=n−j+2 xi Qj,i
(4.24)
Moreover, [m0 −1]
∂ m0 −1 g¯ j∗ i
∂x11 · · · ∂xnin
= ±1
(4.25)
and for any m ≥ m0 + 1 ∂ m0 −1 g¯ j[m−1] ∗ i
∂x11 · · · ∂xnin
(x1 , 0, . . . , 0) = 0
(4.26)
∞ , which satisfies (4.24)–(4.26), will be called dual canonical The form DCF ∞ form of . The name is justified by the following theorem.
THEOREM 15
Two systems 1∞ and 2∞ are formally feedback equivalent if and only if their ∞ ∞ dual canonical forms 1,DCF and 2,DCF coincide.
0882-Perruquetti-ch04_R2_180805
178
Feedback Equivalence of Nonlinear Control Systems
Example 9 Consider the system : ξ˙ = f (ξ ) + g(ξ )u,
ξ ∈ R3 , u ∈ R
whose linear part is assumed to be controllable. Theorem 13 assures that ∞ the system is formally feedback equivalent to the dual normal form DNF given by x˙ 1 = x2 x˙ 2 = x3 + vx3 Q(x1 , x2 , x3 ) x˙ 3 = v where Q(x1 , x2 , x3 ) is a formal power series of the variables x1 , x2 , x3 . Assume for simplicity that m0 = 2, which is equivalent to the condition: g, adf g, and [ g, adf g] linearly independent at 0 ∈ R3 . This implies that we can represent Q = Q(x1 , x2 , x3 ), as Q = c + x1 Q1 (x1 ) + x2 Q2 (x1 , x2 ) + x3 Q3 (x1 , x2 , x3 ) where c ∈ R, c = 0. Observe that any Q of the aforementioned form gives a dual normal ∞ . In order to get the dual canonical form we use Theorem 14, form DNF which assures that the system is formally feedback equivalent to its dual ∞ defined by canonical form DCF x˙˜ 1 = x˜ 2 ˜ x1 , x˜ 2 , x˜ 3 ) x˙˜ 2 = x˜ 3 + v˜ x˜ 3 Q(˜ x˙˜ 3 = v˜ ˜ x1 , x˜ 2 , x˜ 3 ) is a formal power series such that where Q(˜ ˜ 2 (˜x1 , x˜ 2 ) + x˜ 3 Q ˜ 3 (˜x1 , x˜ 2 , x˜ 3 ) ˜ x1 , x˜ 2 , x˜ 3 ) = 1 + x˜ 2 Q Q(˜
4.7 4.7.1
Normal Forms for Single-Input Systems with Uncontrollable Linearization Introduction
[m] ∞ of the system In Section 4.3 we presented the normal forms NF and NF whose linearization (i.e., linear approximation) is controllable. In this
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
179
section, we will deal with systems with uncontrollable linearization. A normal form for homogeneous systems of degree 2, with uncontrollable linearization, was proposed by Kang [51]. The normal form presented in this section was obtained by the authors [81, 85] and it generalizes, on the one hand, the normal form of Kang [51] (uncontrollable linearization) [m] and on the other, the normal form NF (controllable linearization) also obtained by Kang and presented in Section 4.3. Another normal form for single-input systems with uncontrollable linearization has also been proposed by Krener et al. [58–60], and by the authors [78], which differ from ours by another definition of homogeneity (we consider the latter with respect to the linearly controllable variables while theirs is with respect to all variables, see Example 10).
4.7.2 Taylor Series Expansions All objects (i.e., functions, maps, vector fields, control systems, etc.) are considered in a neighborhood of 0 ∈ Rn and assumed to be C∞ -smooth. Consider the single-input system : ξ˙ = f (ξ ) + g(ξ )u,
ξ ∈ Rn , u ∈ R
We assume throughout this section that f (0) = 0 and g(0) = 0. Let [1] : ξ˙ = Fξ + Gu where F = (∂f /∂ξ )(0) and G = g(0), be the linear approximation of the system around the equilibrium point 0 ∈ Rn . If the linear approximation is not controllable, which is the case studied in this section, then there exists a positive integer r ∈ N such that rank (G, FG, . . . , Fn−1 G) = n − r Moreover, there exist coordinates ξ = (ξ1 , . . . , ξr , ξr+1 , . . . , ξn )T of Rr × Rn−r in which the pair (F, G) admits the following Kalman decomposition A=
F1
0
F3
F2
and B =
n×n
0
G2
n×1
where the pair (F2 , G2 ) is controllable. Throughout this section, r will stand for the dimension of the uncontrollable part of the linear approximation of the system and ξ = (ξ1 , . . . , ξr , ξr+1 , . . . , ξn )T will denote coordinates defining the Kalman decomposition.
0882-Perruquetti-ch04_R2_180805
180
Feedback Equivalence of Nonlinear Control Systems
We will use the notation C0∞ (Rr ) for the space of germs at 0 ∈ Rr of smooth R-valued functions of ξ = (ξ1 , . . . , ξr )T ∈ Rr . By R[[ξ1 , . . . , ξr ]], we will denote the space of formal power series of ξ1 , . . . , ξr with coefficients in R. Let h be a smooth R-valued function defined in a neighborhood of 0 × 0 ∈ Rr × Rn−r . By h(ξ ) = h[0] (ξ ) + h[1] (ξ ) + h[2] (ξ ) + · · · =
∞
h[m] (ξ )
m=0
we denote its Taylor series expansion with respect to (ξr+1 , . . . , ξn )T at 0 ∈ Rr × Rn−r , where h[m] (ξ ) stands for a homogeneous polynomial of degree m of the variables ξr+1 , . . . , ξn whose coefficients are in C0∞ (Rr ). Similarly, throughout this section, for a map φ of an open subset of Rr × Rn−r to Rr × Rn−r (resp. for a vector field f on an open subset of Rr × Rn−r ) we will denote by φ [m] (resp. f [m] ) the term of degree m of its Taylor series expansion with respect to (ξr+1 , . . . , ξn )T at 0 ∈ Rr × Rn−r , that is, each component φj[m] of φ [m] (resp. fj[m] of f [m] ) is a homogeneous polynomial of degree m of the variables ξr+1 , . . . , ξn whose coefficients are in C0∞ (Rr ). Consider the Taylor series expansion of the system given by ∞ : ξ˙ = Fξ + Gu + f [0] (ξ ) +
∞
f [m] (ξ ) + g[m−1] u
(4.27)
m=1
Note that, although we assume f (0) = 0, the term f [0] (ξ ) is present because the degree is computed with respect to the variables ξr+1 , . . . , ξn only and thus f [0] is, in general, a function of ξ1 , . . . , ξr . Consider also the Taylor series expansion ∞ of the feedback transformation given by x = Tξ + ∞ :
∞
φ [m] (ξ )
m=0
u = Kξ + Lv + α [0] (ξ ) +
∞
α [m] (ξ ) + β [m−1] (ξ )v
(4.28)
m=1
where T is an invertible matrix and L = 0. The method proposed by Kang and Krener is to study the action of ∞ on the system ∞ step by step, that is, to analyze successively the action of the homogeneous parts of ∞ on the homogeneous parts, of the same degree,
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
181
of ∞ . Notice, however, that in their approach, Kang and Krener consider Taylor series expansions with respect to all state variables ξ1 , . . . , ξn of the system and, as a consequence, homogeneity is considered with respect to all variables ξ1 , . . . , ξn . Following our approach [81, 85] we propose a slight modification of this homogeneity. In view of a different nature of the controllable and uncontrollable parts of the linear approximation, we consider Taylor series expansions with respect to the linearly controllable variables ξr+1 , . . . , ξn only. This leads to considering as homogeneous parts of the system and of the feedback transformations, according to our definition, terms that are polynomial with respect to ξr+1 , . . . , ξn with smooth coefficients depending on ξ1 , . . . , ξr . When analyzing the action of a homogeneous transformation m (understood as homogeneity with respect to the controllable variables) on the system ∞ , we can notice three undesirable phenomena (see Section 4.7.5) that are not present in the action of homogeneous transformations in the controllable case (where homogeneity is considered with respect to all variables). To deal with these problems caused by the presence of the uncontrollable linear part, we will introduce, in Section 4.7.5, different weights for the components corresponding to the controllable and uncontrollable parts.
4.7.3
Linear Part and Resonances
Let λ = (λ1 , . . . , λr ) ∈ Cr be the set of eigenvalues associated to the uncontrollable part of the linear system ξ˙ = Fξ + Gu By a linear feedback transformation
1 :
x = Tξ u = Kξ + Lv
it is always possible to bring the linear system into the following Jordan– Brunovský canonical form A=
J
0
0
A2
and B = n×n
0 B2
n×1
where J is the Jordan canonical form of dimension r and (A2 , B2 ) the Brunovský canonical form of dimension n − r. In the case when all
0882-Perruquetti-ch04_R2_180805
182
Feedback Equivalence of Nonlinear Control Systems
eigenvalues λi are real, we have
λ1
0 J= . . .
0
σ2
···
..
.
..
.
..
.
..
.
···
0
0
.. . σr λr
,
σi ∈ {0, 1}
r×r
In the case of complex eigenvalues, we replace in J the eigenvalue λj by the matrix βj αj
j = −βj αj 2×2 where λj = αj + iβj , and we replace the integer σj ∈ {0, 1} either by the matrix 0 0 1 0 j = or j = 0 0 2×2 0 1 2×2 Recall from Section 4.2 the notion of a resonant eigenvalue and the resonant set associated with it. An eigenvalue λj is called resonant if there exists a r-tuple k = (k1 , . . . , kr ) ∈ Nr of nonnegative integers, satisfying |k| = k1 + · · · + kr ≥ 2, such that
DEFINITION 1
λj = λ1 k1 + · · · + λr kr For each eigenvalue λj , where 1 ≤ j ≤ r, we define Rj = k = (k1 , . . . , kr ) ∈ Nr : |k| ≥ 2 and λj = λ1 k1 + · · · + λr kr which is called the resonant set associated to λj .
4.7.4
Notations and Definitions
The method described in Section 4.3 (proposed by Kang and Krener [54], and then followed by Kang [50, 51] and by the authors [79, 83]) is to analyze step by step the action of the transformation ∞ on the system ∞ . In the controllable case, it consists of bringing the linear part of the system into the
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
183
Brunovský canonical form and then applying, step by step, homogeneous feedback transformations of the form
m
:
x = ξ + φ [m] (ξ ) u = v + α [m] (ξ ) + β [m−1] (ξ )v
in order to normalize the homogeneous part of degree m of the system. The advantage of this method, in the controllable case, follows from the fact that homogeneous transformations m leave invariant all terms of degree smaller than m of the system. The situation gets very different in the uncontrollable case with the modified notion of homogeneity. To see the difference, we analyze the action of m on the system ∞ , given by (4.27). Let ˜ ∞ : x˙ = Fx + Gv + f˜ [0] (x) +
∞
f˜ [m] (x) + g˜ [m−1] (x)v
m=1
be the system ∞ transformed by m . Recall that for both systems, the first r components of the state correspond to the uncontrollable part and that the degree of homogeneity (for all terms of the systems and for the transformation m ) is computed with respect to the controllable variables, that is, the last n − r variables only. We can observe the following three undesirable phenomena. First, note that the homogeneous transformation m does not preserve homogeneous (with respect to linearly controllable variables) terms of degree smaller than m. It only preserves terms of degree smaller than m − 1, that is, f˜ [k] = f [k] and g˜ [k−1] = g[k−1] , for any 0 ≤ k ≤ m − 2, while it transforms those of degree m − 1 as follows g˜ [m−2] = g[m−2]
and
f˜ [m−1] = f [m−1] +
n ∂φ [m] [0] f ∂ξi i
i=r+1
Note that, when comparing the homogeneous parts of the same degree k of two systems, we have to compare the homogeneous parts of degree k of the drifts and the homogeneous parts of degree k − 1 of control vector fields. As the homogeneity is considered with respect to the state and the control, the homogeneous part of degree k of the system is represented by the homogeneous part f [k] , of degree k, of the drift and the homogeneous part g[k−1] , of degree k − 1, of the control vector field multiplied by the control u.
0882-Perruquetti-ch04_R2_180805
184
Feedback Equivalence of Nonlinear Control Systems
Secondly, m transforms the homogeneous part ( f [m] , g[m−1] ), of degree m, not according to a homological equation, but in such a way that f˜ [m] = f [m] + [Aξ , φ [m] ] + Bα [m] +
+
r i=1
n i=r+1
∂φ [m] [1] ∂f [1] [m] f − φ ∂ξi i ∂ξi i
∂φ [m] [0] ∂f [0] [m] + g[0] α [m] f − φ ∂ξi i ∂ξi i
g˜ [m−1] = g[m−1] + adB φ [m] + Bβ [m−1] + g[0] β [m−1] +
n ∂φ [m] [0] g ∂ξi i
i=r+1
Thirdly, the Lie bracket of two homogeneous vectors fields f [m] and g[k] is given by n ∂g[k] [m] ∂f [m] [k] [m] [k] (ξ ) = f (ξ ) − g (ξ ) f ,g ∂ξi i ∂ξi i i=1
and thus fails, in general, to be homogeneous of degree m + k − 1 because the terms (∂g[k] /∂ξi )fi[m] (ξ ) and (∂f [m] /∂ξi )gi[k] (ξ ), for 1 ≤ i ≤ r, are, in general, homogeneous of degree m + k. These three inconveniences are caused only by the fact that differentiating with respect to the variables ξ1 , . . . , ξr does not decrease the degree (in particular, by the presence of terms of degree 0 with respect to the variables ξr+1 , . . . , ξn ). To overcome this, we define, for any m ≥ 0, T [m] f m = f1[m−1] , . . . , fr[m−1] , fr+1 , . . . , fn[m] T [m] g m = g1[m−1] , . . . , gr[m−1] , gr+1 , . . . , gn[m] T [m] φ m = φ1[m−1] , . . . , φr[m−1] , φr+1 , . . . , φn[m] where, for any 1 ≤ i ≤ r, we set fi[−1] = gi[−1] = φi[−1] = 0. Control systems, vector fields, feedback transformations, etc., that are homogeneous with respect to the just-defined weights, will be called weighted homogeneous. Note that the weighted homogeneity just defined is related with the decomposition of the state space Rn into uncontrollable and controllable parts and therefore it does not apply to applications with values in R. In particular, for real-valued homogeneous polynomials h[m] , we will write h m = h[m] .
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
185
We will denote by P[m] (ξ ) the space of homogeneous polynomials of degree m of the variables ξr+1 , . . . , ξn (with coefficients depending on ξ1 , . . . , ξr ) and by P≥m (ξ ) the space of formal power series of the variables ξr+1 , . . . , ξn (with coefficients depending on ξ1 , . . . , ξr ) starting from terms of degree m. We will denote by V m (ξ ) the space of weighted m -homogeneous vector fields, that is, the space of vector fields whose first r components are in P[m−1] (ξ ) and the last n − r components are in P[m] (ξ ). Moreover, V ≥m (ξ ) will denote the space of vector fields formal power series whose first r components are in P≥m−1 (ξ ) and the last n − r components are in P≥m (ξ ).
4.7.5 Weighted Homogeneous Systems Applying a linear feedback transformation, we can bring the linear approximation (F, G) of the system into the Jordan–Brunovský canonical form (A, B), that is, the uncontrollable part, of dimension r, is in the Jordan form and the controllable part, of dimension n − r, in the Brunovský form. Notice, however, that contrary to the controllable case (where there are no zero degree terms while the terms of degree one are just linear terms that we bring to the Brunovský canonical form), after having normalized linear terms of an uncontrollable system, we are still left with weighted homogeneous terms of degree zero and one. We can normalize them as follows. PROPOSITION 4
Consider the system ≤1 : ξ˙ = Aξ + Bu + f 0 (ξ ) + f 1 (ξ ) + g 0 (ξ )u where (A, B) is in the Jordan–Brunovský canonical form: 1. There exists a smooth feedback transformation of the form
≤1
:
x = ξ + φ 0 (ξ ) + φ 1 (ξ ) u = v + α 0 (ξ ) + α 1 (ξ ) + β 0 (ξ )v
(4.29)
which takes the system ≤1 into the system ˜ ≤1 : x˙ = Ax + Bv + f˜ 1 (x)
(4.30)
1 modulo terms in V ≥2 , where the vector field f˜ 1 satisfies f˜j = 0 for r + 1 ≤ j ≤ n. 2. Assume that all eigenvalues λ1 , . . . , λr of the Jordan–Brunovský canonical form (A, B) are real and distinct (in particular all σj = 0). Then a formal
0882-Perruquetti-ch04_R2_180805
186
Feedback Equivalence of Nonlinear Control Systems feedback transformation 1 of the form (4.29), which takes the system ≤1 ˜ ≤1 defined by (4.30), can be chosen in such a way that into the system the vector field f˜ 1 is replaced by f¯ 1 (x) whose components are given by 1 f¯j (x)
=
k∈Rj
k
γjk x11 · · · xrkr
0
if 1 ≤ j ≤ r if r + 1 ≤ j ≤ n
(4.31)
The existence of a transformation x = ξ + φ 1 (ξ ) yielding the form of 1 f¯j (x) in (2) is an immediate consequence of Theorem 1. Now we will study the action of the weighted homogeneous feedback
m
x = ξ + φ m (ξ ) :
u = v + α m (ξ ) + β m−1 (ξ )v
(4.32)
on the following weighted homogeneous system m : ξ˙ = Aξ + Bu + f¯ 1 (ξ ) + f m (ξ ) + g m−1 (ξ )u
(4.33)
1 where, because of Proposition 4, we assume that f¯j is of the form (4.31). Note that a weighted homogeneous feedback is a smooth feedback; it depends polynomially on the variables ξr+1 , . . . , ξn and smoothly on the variables ξ1 , . . . , ξr . ˜ m given by Consider another weighted homogeneous system
˜ m : x˙ = Ax + Bv + f˜ 1 (x) + f˜ m (x) + g˜ m−1 (x)v
(4.34)
˜ m , and we where f˜ 1 = f¯ 1 . We will say that m transforms m into m m m m m ˜ , if transforms into will denote it by ∗ ( ) = x˙ = Ax + Bv + f˜ 1 (x) + f˜ m (x) + g˜ m−1 (x)v + R ≥m+1 (x, v) where R ≥m+1 (x, v) ∈ V ≥m+1 (x, v). Recall that λj , for 1 ≤ j ≤ r, are the eigenvalues of the uncontrollable part of the linear approximation and that σj for 2 ≤ j ≤ r, define the corresponding Jordan form (see Section 4.7.3). We define additionally σr+1 = 0 and for any r + 1 ≤ j ≤ n − 1, we put λj = 0 and σj+1 = 1. Analysis of weighted homogeneous systems is based on the following result which generalizes, to the uncontrollable case, that proved by Kang [50] (and recalled in Proposition 2).
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
187
PROPOSITION 5
For any m ≥ 2, the feedback transformation m , of the form (4.32), brings the ˜ m , given by (4.34), if and only if the following system m , given by (4.33), into relations m m m m m − λj φj − σj+1 φj+1 = f˜j − fj L 1 φj Aξ +f m m−1 m−1 LB φj = g˜ j − gj (4.35) m m m LAξ +f 1 φn + α m = f˜n − fn m m−1 m−1 LB φn + β m−1 = g˜ n − gn hold for any 1 ≤ j ≤ n − 1. This proposition can be viewed as the weighted control homological equation for systems with uncontrollable linearization (its proof follows the same line as that of Kang [50] for the standard control homological equation (CHE)). Once again, solving a system of first-order partial differential equations may be avoided if the analysis is performed step by step, and thus the ˜ m (with uncontrollable feedback equivalence of two systems m and linearization) is reduced to solving the algebraic system (4.35). The following result gives our normal form for weighted homogeneous systems with uncontrollable linearization. Recall the notation πi (x) = (x1 , . . . , xi ). THEOREM 16
For any m ≥ 2, there exists a weighted feedback transformation m that transforms the weighted homogeneous system m , given by (4.33), into its weighted homogeneous normal form m NF : x˙ = Ax + Bv + f¯ 1 (x) + f¯ m (x)
(4.36)
where f¯ 1 (x) is given by Proposition 4 (2) and the vector field f¯ m (x) satisfies m−3 (πi (x)) if 1 ≤ j ≤ r xm−1 S (π (x)) + ni=r+2 xi2 Qj,i r+1 j,m r m n 2 m−2 (π (x)) f¯j (x) = if r + 1 ≤ j ≤ n − 2 i i=j+2 xi Pj,i 0 if n − 1 ≤ j ≤ n (4.37) where Sj,m (πr (x)) ∈ C0∞ (Rr ) are C∞ -functions of the variables x1 , . . . , xr and the m−2
m−3
functions Pj,i and Qj,i are homogeneous polynomials, respectively, of degree m − 2 and m − 3, of the variables xr+1 , . . . , xi , with coefficients in C0∞ (Rr ).
0882-Perruquetti-ch04_R2_180805
188
Feedback Equivalence of Nonlinear Control Systems
The proof of Theorem 16 is based on Theorem 18, stated in Section 4.7.7, which explicitly gives transformations bringing m into its normal form m NF . The normal form generalizes to the uncontrollable case the normal [m] form NF of Kang [50] for systems with controllable linearization, which was stated in Theorem 3. It can also be viewed as a generalization of the normal form obtained by Kang [51] in the uncontrollable case for second-order terms. Other normal forms, for systems with uncontrollable linearization, have been obtained earlier [78], and for third-order terms also [58–60]. Note, however, that those normal forms coincide neither with our normal 2 3 form NF nor NF because of the different weights used, as explained in the following example.
Example 10
Consider the system ξ˙ = f (ξ ) + g(ξ )u on R3 and assume that the linearly controllable subsystem is two-dimensional and that the linear part is in the Jordan–Brunovský canonical form. The homogenous system [2] (homogeneity being calculated with respect to all variables ξ1 , ξ2 , ξ3 ) is ξ˙1 = λξ1 + f1[2] (ξ ) + g1[1] (ξ )u ξ˙2 = ξ3 + f2[2] (ξ ) + g2[1] (ξ )u ξ˙3 = u + f3[2] (ξ ) + g3[1] (ξ )u The linearly uncontrollable subsystem is of dimension one (with ξ1 being the linearly uncontrollable variable and (ξ2 , ξ2 )T being the linearly controllable variables) and the resonant set associated with the eigenvalue λ is empty if and only if λ = 0. Kang [51] proved that [2] is equivalent via a [2] : homogeneous feedback 2 to the following normal form NF x˙ 1 = λx1 + γ2 x12 + x2 s1,2 (x1 ) + x32 q1,3 x˙ 2 = x3 x˙ 3 = u where γ2 = 0 if λ = 0 (no resonances) and γ2 ∈ R if λ = 0. Moreover, s1,2 is a linear function of x1 and q1,3 is a constant. 2 Now we will compare this normal form with the normal forms NF and 3 NF . To this end, we start with 1 ξ˙1 = λξ1 + f1 (ξ )
1 : ξ˙2 = ξ3 + f2 1 (ξ ) 1 ξ˙3 = u + f3 (ξ )
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization 1
189
1
where f2 (ξ ) and f3 (ξ ) are linear functions with respect to ξ2 and ξ3 with 1 coefficients that are arbitrary functions of ξ1 while f1 (ξ ) is an arbitrary function of ξ1 whose development at zero starts with quadratic terms. Now 1 1 Proposition 4(1) implies that we can annihilate f2 and f3 . If λ = 0, then 1 there are no resonances so we can also annihilate f1 and without loss 1 1 of generality we can assume that f1 (ξ ) is in the normal form f¯1 (ξ ) = 0 1 assured by Proposition 4. If λ = 0, then all terms of f1 are resonant so ∞ 1 1 i we can assume that f1 is in the normal form f¯1 (ξ ) = i=2 γi ξ1 , where ∞ i γi ∈ R. The vector field i=2 γi ξ1 (∂/∂ξ1 ) can be normalized by a local p
2p−1
diffeomorphism around ξ1 = 0 into the form (±x1 + γ2p−1 x1 however, this will not be used here. Consider the system
)(∂/∂x1 );
2 : ξ˙ = Aξ + Bv + f¯ 1 (ξ ) + f 2 (ξ ) + g 1 (ξ )v where (A, B) is in the Jordan–Brunovský canonical form and f¯ 1 is in the aforementioned normal form, that is Aξ + f¯ 1 (ξ ) + Bu = (λξ1 + 1 1 i f¯1 (ξ ))(∂/∂ξ1 ) + ξ3 (∂/∂ξ2 ) + u(∂/∂ξ3 ), where f1 (ξ ) equals 0 or ∞ i=2 γi ξ1 2 2 (depending on λ). Moreover, the components f2 (ξ ) and f3 (ξ ) are 2 1 quadratic functions of ξ2 and ξ3 ; the components f1 (ξ ), g2 (ξ ), and 1 g3 (ξ ) are linear functions of ξ2 , ξ3 (all coefficients depending on ξ1 ), and 1 g1 (ξ ) depends only on ξ1 . By a weighted homogenous (of degree 2 with respect to ξ2 , ξ3 ) feedback transformation 2 , we can bring 2 into the normal form
2
1 x˙ 1 = λx1 + f¯1 (x) + x2 S1,2 (x1 )
NF : x˙ 2 = x3 x˙ 3 = u where S1,2 is an arbitrary function of x1 . Now consider 3 : ξ˙ = Aξ + Bu + f¯ 1 (ξ ) + f 3 (ξ ) + g 2 (ξ )u where (A, B) is in the Jordan–Brunovský canonical form and f¯ 1 is in the 3 3 normal form described earlier. Moreover, the components f2 (ξ ) and f3 (ξ ) 3 2 2 are cubic functions of ξ2 , ξ3 ; the components f1 (ξ ), g2 (ξ ), and g3 (ξ ) are 2 quadratic functions of ξ2 , ξ3 ; and g1 (ξ ) is a linear function of ξ2 , ξ3 (all coefficients depending on ξ1 ). By a weighted homogenous (of degree 3
0882-Perruquetti-ch04_R2_180805
190
Feedback Equivalence of Nonlinear Control Systems
with respect to ξ2 , ξ3 ) feedback transformation 3 we can bring 3 into the normal form 3
1 x˙ 1 = λx1 + f¯1 (x) + x22 S1,3 (x1 ) + x32 Q1,3 (x1 )
NF : x˙ 2 = x3 x˙ 3 = v where S1,3 and Q1,3 are arbitrary functions of x1 . [2] , where Observe that the term x2 s1,2 (x1 ) of the Kang normal form NF s1,2 (x1 ) is linear, shows up as the first term in the development of x2 S1,2 (x1 ) 2 of NF while the term x32 q1,3 (x1 ), where q1,3 is constant, shows up as the first term in the development of x32 Q1,3 (x1 ) but both S1,2 (x1 ) and Q1,3 (x1 ) contain, in general, terms of arbitrary degrees (except for constant terms [2] in S1,2 ). This example illustrate mutual differences between the form NF 2 3 of Kang and of ours NF and NF .
4.7.6 Weighted Homogeneous Invariants In this section, we will define weighted homogeneous invariants a m j,i+2 of weighted homogeneous systems m under weighted homogeneous feedback transformations m and we will state for them results of [81, 85] generalizing, to the uncontrollable case, a result established by Kang [50] in the controllable case. Consider the weighted homogeneous system (4.33). For any i ≥ 0, let us define the vector field Xim−1 (ξ ) = (−1)i adiAξ +f 1 (ξ )+f m (ξ ) (B + g m−1 (ξ )) m−1
be the homogeneous part of degree m − 1 of Xim−1 . It and let Xi means that the first r components are homogeneous of degree m − 2 and the last n − r components homogeneous of degree m − 1 with respect to the variables ξr+1 , . . . , ξn . One can easily check that m−1 Xi (ξ )
= (−1)
i
adiAξ +f 1 g m−1
+
i
(−1)
k
adi−k adAk−1 B f m Aξ +f 1
k=1
Define the set of indices r = 1r ∪ 2r ⊂ N × N by taking 1r = ( j, i) ∈ N × N : 1 ≤ j ≤ r and 0 ≤ i ≤ n − r − 1 , 2r = ( j, i) ∈ N × N : r + 1 ≤ j ≤ n − 2 and 0 ≤ i ≤ n − j − 2
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
191
For any r + 1 ≤ k ≤ n, define the following subspaces Wk = (ξ1 , . . . , ξr , ξr+1 , . . . , ξn )T ∈ Rr × Rn−r : ξk+1 = · · · = ξn = 0 and let πk (ξ ) denote the projection on Wk , that is, πk (ξ ) = (ξ1 , . . . , ξr , ξr+1 , . . . , ξk , 0, . . . , 0)T . For any 1 ≤ j ≤ n, we denote by Cj = (0, . . . , 0, 1, 0, . . . , 0) the row vector in Rn , all of whose components are zero except the jth component which equals 1. For any ( j, i) ∈ 1r (resp. ( j, i) ∈ 2r ), we define a m j,i+2 (ξ ) as the homogeneous part of degree m − 3 (resp. of degree m − 2 ) of the function m−1 Cj Xim−1 , Xi+1 (πn−i (ξ )) One can easily establish that m−1 m−1 a m j,i+2 (ξ ) = Cj adAi B Xi+1 − adAi+1 B Xi (πn−i (ξ )) The functions a m j,i+2 thus defined will be called weighted homogeneous m -invariants of the weighted homogeneous system m . ˜ m given by Consider, along with m defined by (4.33), the system m j,i+2 the weighted homogeneous m -invariants of (4.34) and denote by a˜ the latter system. The following result, which generalizes that obtained by Kang [50] for systems with controllable linearization, asserts that the weighted homogeneous m -invariants a m j,i+2 are complete invariants of weighted homogeneous feedback and also illustrates their meaning for the normal m form NF . THEOREM 17
For any m ≥ 2, we have the following properties: ˜ m , given 1. Two weighted homogeneous systems m , given by (4.33), and by (4.34), are equivalent via a weighted homogeneous feedback m if and only if, for any ( j, i) ∈ r , we have a m j,i+2 = a˜ m j,i+2
0882-Perruquetti-ch04_R2_180805
192
Feedback Equivalence of Nonlinear Control Systems m
2. The m -invariants a¯ m j,i+2 of the weighted homogeneous normal form NF , defined by (4.36) and (4.37), are given by m
m j,i+2
a¯
4.7.7
(x) =
∂ 2 f¯j
2 ∂xn−i
(πn−i (x))
Explicit Normalizing Transformations
In this section, we present the explicit weighted homogeneous transforma m tions bringing the system m into its normal form NF . They have two main advantages: first, they are easily computable (via differentiation and integration of polynomials); secondly, the proof of Theorem 16 giving the m normal form NF is based on such transformations. For any r + 1 ≤ i ≤ n and any 1 ≤ j < i ≤ n, the homogeneous poly m−1 nomial ψj,i is defined by m−1
ψj,i
m−1
= Cj Xn−i
m−1
For any r + 1 ≤ i ≤ j ≤ n, we define recursively the polynomials ψj,i setting m−1
ψj,r
by
m−1
= ψr+1,r+1 = 0
and by taking
m−1 ψj,i
m
=
∂fj−1 ∂ξi
m−1 + LAξ +f 1 ψj−1,i
m−1 + ψj−1,i−1
+
ξi 0
m−1
∂ψj−1,i ∂ξi−1
dξi
m−1
Note that the degree of the homogeneous polynomial ψj,i is either m − 2 if 1 ≤ j ≤ r or m − 1 if r + 1 ≤ j ≤ n. Consider the weighted homogeneous feedback transformation
m :
x = ξ + φ m (ξ ) u = v + α m (ξ ) + β m−1 (ξ )v
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
193
defined, for any 1 ≤ j ≤ n, by m
φj
(ξ ) =
n
ξi
i=r+1 0
m−1
ψj,i
(ξ¯i ) dξi
m
m
α m (ξ ) = −fn (ξ ) − LAξ +f 1 φn (ξ ) m−1
β m−1 (ξ ) = −gn
(4.38)
m
(ξ ) − LB φn (ξ )
We have the following result. THEOREM 18
For any m ≥ 2, the weighted homogeneous feedback transformation m , defined by (4.38), brings the weighted homogeneous system m , given by (4.33), into its m weighted homogeneous normal form NF , defined by (4.36).
4.7.8 Weighted Normal Form for Single-Input Systems with Uncontrollable Linearization In this section, we present our main result giving a normal form under a formal feedback transformation ∞ (see Section 4.3 for some comments on formal feedback) of any single-input control system (with controllable or uncontrollable linearization). For any 1 ≤ i ≤ n, we denote πi (x) = (x1 , . . . , xi )T . THEOREM 19
Consider the system ∞ , given by (4.27), and assume that all eigenvalues of the uncontrollable part of the linear approximation are real. There exists a formal feedback transformation ∞ of the form (4.28), which brings the system ∞ , given by (4.27), into its normal form ∞ NF : x˙ = Ax + Bv + f¯ (x)
given by λj xj + σj xj+1 + f¯j (x) if 1 ≤ j ≤ r x˙ j = xj+1 + f¯j (x) if r + 1 ≤ j ≤ n − 1 v if j = n
(4.39)
0882-Perruquetti-ch04_R2_180805
194
Feedback Equivalence of Nonlinear Control Systems
where
kr k k1 k∈Rj γj x1 · · · xr + xr+1 Sj (π(xr+1 )) 2 + n if 1 ≤ j ≤ r i=r+2 xi Qj,i (πi (x)), f¯j (x) = n 2 if r + 1 ≤ j ≤ n − 2 i=j+2 xi Pj,i (πi (x)), 0, if n − 1 ≤ j ≤ n (4.40)
where Pj,i , Qj,i , and Sj are formal power series of the indicated variables and γjk ∈ R. REMARK 1
In the general case of complex eigenvalues of the uncontrollable part, for each complex eigenvalue λj = αj + iβj , we replace the expression for x˙ j by x˙ j,1 x˙ j,2
=
αj
βj
−βj
αj
xj,1
xj,2
+ j
xj,1 xj,2
+ f¯j
where f¯j = (f¯j,1 , f¯j,2 )T , for 1 ≤ j ≤ r, being defined by formula (4.40), with k , γ k )T ∈ R2 , and S and Q being R2 -valued formal power series of γjk = (γj,1 j j,i j,2 the indicated variables. Of course, the resonant set of a complex eigenvalue λj is the same as that corresponding to its conjugate λ¯ j , which explains why we have the same Rj for both components xj,1 and xj,2 . Note that the normal form is a natural combination of the two extreme cases: that of dynamical systems and that of systems with controllable linearization. Indeed, if r = n, we deal with a dynamical system, then ∞ the coordinates (xr+1 , . . . , xn ) are not present and the normal form NF reduces to a dynamical system x˙ = Jx + f¯ (x) containing resonant terms k only, that is, f¯j (x) = k∈Rj γjk x11 · · · xrkr , for 1 ≤ j ≤ n. This is, of course, Poincaré normal form of a vector field under a formal diffeomorphism [3] (see also Theorem 2). On the other hand, if r = 0 (i.e., the linear approximation is controllable), the coordinates (x1 , . . . , xr ) are not present and ∞ of Kang [50] (see Section 4.3), for which our normal form reduces to NF f¯j (x) = ni=j+2 xi2 Pj,i (πi (x)), for 1 ≤ j ≤ n − 2 and f¯j (x) = 0 otherwise. Another normal form for nonlinear single-input systems with uncontrollable linearization was obtained by the authors earlier [78] (see also [77]) and by Krener et al. [58–60]. Note, however, that those normal forms differ substantially from the one proposed in this paper and in [81]. Indeed, in the approach presented, the homogeneity is calculated with respect to the linearly controllable variables while it is calculated with respect to all variables elsewhere [58–60, 78], compare Example 10.
0882-Perruquetti-ch04_R2_180805
4.7 4.7.9
Single-Input Systems with Uncontrollable Linearization
195
Example
Example 11 (Kapitsa Pendulum) In this example, we consider the Kapitsa pendulum whose equations are given by [7, 19] w α˙ = p + sin α l w2 w p˙ = gl − 2 cos α sin α − p cos α l l
(4.41)
z˙ = w
where α is the angle of the pendulum with the vertical z-axis, w is the velocity of the suspension point z, p is proportional to the generalized impulsion, g is the gravity constant, and l is the length of the pendulum. ˙ Introduce the coordinate We assume to control the acceleration a = w. system (ξ1 , ξ2 , ξ3 , ξ4 ) = (α, p, z/l, w/l) and take u = a/l as the control. The system (4.41) considered around an equilibrium point (α0 , p0 , z0 , u0 ) = (kπ, 0, 0, 0), where k ∈ Z, rewrites as ξ˙1 = ξ2 + ξ1 ξ4 + ξ4 T1 (ξ1 ) ξ˙2 = g0 ξ1 − ξ2 ξ4 + ξ2 ξ4 T2 (ξ1 ) + ξ42 Q2 (ξ1 ) + R2 (ξ1 ) ξ˙3 = ξ4
(4.42)
ξ˙4 = u where g0 = g/l; ε = ±1; T1 , T2 , and R2 are analytic functions whose 1-jets at (kπ, 0, 0, 0) vanish; and Q2 is an analytic function vanishing at (kπ , 0, 0, 0). The case ε = 1 corresponds to α0 = 2nπ and the case ε = −1 to α0 = (2n + 1)π. One can easily check that the quadratic feedback transformation
y1 = ξ1 − ξ1 ξ3 2 :
y 2 = ξ2 + ξ 2 ξ 3 y 3 = ξ3 y 4 = ξ4
0882-Perruquetti-ch04_R2_180805
196
Feedback Equivalence of Nonlinear Control Systems
brings the system (4.42) into the system y˙ 1 = y2 + y2 y3 S˜ 1 (y3 ) + y4 T˜ 1 (y1 , y3 ) ˜ 2 (y1 , y3 ) + R˜ 2 (y1 ) y˙ 2 = εg0 y1 + y1 y3 S˜ 2 (y1 , y3 ) + y4 T˜ 2 (y1 , y2 , y3 ) + y42 Q y˙ 3 = y4 y˙ 4 = u (4.43) ˜ 1, Q ˜ 2 , R˜ 2 , S˜ 2 , T˜ 1 , and T˜ 2 are analytic functions. where Q Since the vector field defined in R3 by f = T˜ 1 ( y1 , y3 )
∂ ∂ ∂ + T˜ 2 (y1 , y2 , y3 ) + ∂y1 ∂y2 ∂y3
does not vanish at (0, 0, 0) ∈ R3 (resp. at (π , 0, 0) ∈ R3 ), there exists, in a neighborhood of (0, 0, 0) ∈ R3 (resp. of (π , 0, 0) ∈ R3 ), an analytic transformation x = φ(y) of the form x1 = φ1 (y1 , y3 ) x2 = φ2 (y1 , y2 , y3 ) x3 = y3 such that (φ∗ f )(x) =
∂ ∂x3
This transformation, completed with x4 = y4 and u = v, brings the system (4.43) into the normal form (compare with Theorem 19) x˙ 1 = x2 + R¯ 1 (x1 , x2 ) + x3 S¯ 1 (π3 (x)) ¯ 2 (π3 (x)) x˙ 2 = εg0 x1 + R¯ 2 (x1 , x2 ) + x3 S¯ 2 (π3 (x)) + x42 Q x˙ 3 = x4
(4.44)
x˙ 4 = v where π3 (x) = (x1 , x2 , x3 ). Clearly, the dimension of the linearly controllable part of (4.42), (i.e., that of (4.44)), equals 2, which means that r = 2.
0882-Perruquetti-ch04_R2_180805
4.7
Single-Input Systems with Uncontrollable Linearization
197
In the case ε = 1, the eigenvalues of the uncontrollable linear part are √ λ1 = −λ2 = g0 , while in the case ε = −1, they are given by λ1 = −λ2 = √ i g0 . In both cases, those eigenvalues are resonant and satisfy, for any m ≥ 2, the relations λ1 = mλ1 + (m − 1)λ2
and λ2 = (m − 1)λ1 + mλ2
Applying Poincaré’s method [3], we get rid, by a formal diffeomorphism in the space (x1 , x2 ), of all nonresonnant terms of the dynamical system x˙ 1 = x2 + R¯ 1 (x1 , x2 ) x˙ 2 = εg0 x1 + R¯ 2 (x1 , x2 ) and thus we transform the system, for ε = 1 and ε = −1, into one of the following normal forms. √ Set λ = g0 . For ε = 1, which is the case of real eigenvalues, the normal form is given by (compare with Theorem 19) x˙ 1 = λx1 +
∞
¯ 1 (π3 (x)) am x1 (x1 x2 )m−1 + x3 S¯ 1 (π3 (x)) + x42 Q
m=2
x˙ 2 = −λx2 +
∞
¯ 2 (π3 (x)) bm x2 (x1 x2 )m−1 + x3 S¯ 2 (π3 (x)) + x42 Q
(4.45)
m=2
x˙ 3 = x4 x˙ 4 = v For ε = −1, which corresponds to the case of complex eigenvalues (see Remark 1), the normal form is given by x˙ 1 = λx2 +
∞
m−1 ˜ 1 (π3 (x)) (cm x1 + dm x2 ) x12 + x22 + x3 S˜ 1 (π3 (x)) + x42 Q
m=2
x˙ 2 = −λx1 +
∞
m−1 ˜ 2 (π3 (x)) (−dm x1 + cm x2 ) x12 + x22 + x3 S˜ 2 (π3 (x)) + x42 Q
m=2
x˙ 3 = x4 x˙ 4 = v (4.46) ¯ 1 , S¯ 2 , and Q ¯ 2 on the one hand, and the functions S˜ 1 , The functions S¯ 1 , Q ˜ ˜ ˜ Q1 , S2 , and Q2 on the other, are formal power series which, in general, are different from the objects denoted earlier by the same symbols.
0882-Perruquetti-ch04_R2_180805
198
Feedback Equivalence of Nonlinear Control Systems
Note that we transform the original system into its normal form (4.44) using analytic feedback transformations and that the only passage defined by a formal feedback transformation is that transforming the system (4.44) into (4.45) (resp. (4.46)).
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
In this section, we present a generalization of normal forms obtained in Section 4.3 for multi-input nonlinear control systems with controllable linearization [88]. Normal forms for two-input nonlinear control systems have been obtained previously [86], and will be derived here as a particular case. The general case of multi-input systems with uncontrollable linearization will appear elsewhere [89]. We will illustrate normal forms in this section by considering three physical examples: a model of a crane in Example 12, a model of a planar vertical takeoff and landing aircraft in Example 13, and finally prototype of a wireless multi-vehicle testbed in Example 14 [15, 17]. Consider control systems of the form : ξ˙ = F(ξ , u),
ξ ∈ Rn , u = (u1 , . . . , up )T ∈ Rp
around the equilibrium point (0, 0) ∈ Rn × Rp , that is, f (0, 0) = 0, and denote by [1] : ξ˙ = Fξ + Gu = Fξ + G1 u1 + · · · + Gp up its linearization at this point, where F=
∂F (0, 0), ∂ξ
G1 =
∂F (0, 0) , . . . , ∂u1
Gp =
∂F (0, 0) ∂up
We will assume for simplicity [88, 89] that G1 ∧ · · · ∧ Gp = 0, and the linearization is controllable, that is span{Fi Gk : 0 ≤ i ≤ n − 1, 1 ≤ k ≤ p} = Rn Let (r1 , . . . , rp ), 1 ≤ r1 ≤ · · · ≤ rp = r, be the largest, in the lexicographic ordering, p-tuple of positive integers, with r1 + · · · + rp = n, such that span{Fi Gk : 0 ≤ i ≤ rk − 1, 1 ≤ k ≤ p} = Rn
(4.47)
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
199
Without loss of generality we can assume that the linearization is in Brunovský canonical form ˙ [1] CF : ξ = Aξ + Bu = Aξ + B1 u1 + · · · + Bp up where A = diag(A1 , . . . , Ap ), B = (B1 , . . . , Bp ) = diag(b1 , . . . , bp ), that is,
A1
. A= ..
0
··· ..
.
···
0
.. .
Ap
···
b1
,
. B= ..
..
.. .
.
···
0
n×n
0
bp
(4.48)
n×p
with (Ak , bk ) in Brunovský single-input canonical forms of dimensions rk , for any 1 ≤ k ≤ p. With the p-tuple (r1 , . . . , rp ), we associate the p-tuple (d1 , . . . , dp ) of nonnegative integers, 0 = dp ≤ · · · ≤ d1 ≤ r − 1, such that r1 + d1 = · · · = rp + dp = r. Our aim is to give a normal form of feedback classification of such systems under invertible feedback transformations of the form ϒ :
x = φ(ξ ) u = ψ(ξ , v)
where φ(0) = 0 and ψ(0, 0) = 0. We study, step by step, the action of the Taylor series expansion ϒ ∞ of the feedback transformation ϒ, given by ∞
x = φ(ξ ) = ξ + ϒ∞ :
φ [m] (ξ )
m=2
u = ψ(ξ , v) = v +
∞
(4.49) ψ
[m]
(ξ , v)
m=2
on the Taylor series expansion ∞ of the system , given by ∞ : ξ˙ = Aξ + Bu +
∞
f [m] (ξ , u)
(4.50)
m=2
Throughout this section, in particular, in formulas (4.49) and (4.50), the homogeneity of f [m] and ψ [m] will be taken with respect to the variables ξ , v and ξ , u, respectively.
0882-Perruquetti-ch04_R2_180805
200
Feedback Equivalence of Nonlinear Control Systems
4.8.1
Non-affine Normal Forms
Let 1 ≤ s ≤ t ≤ p. We denote by xs = (xs,ds +1 , . . . , xs,r ),
xs,r+1 = vs
and we set x¯ s,i = (xs,ds +1 , . . . , xs,i ) for any ds + 1 ≤ i ≤ r + 1. We also define the projections s πt,i (x) = x¯ 1,i , . . . , x¯ s,i , x¯ s+1,i−1 , . . . , x¯ t−1,i−1 , x¯ t,i , x¯ t+1,i−1 , . . . , x¯ p,i−1 where x¯ s,i is empty whenever 0 ≤ i ≤ ds . Our main result for multi-input nonlinear control systems with controllable linearization is as follows. THEOREM 20
The control system ∞ , defined by (4.50), is feedback equivalent, by a formal feedback transformation ϒ ∞ of the form (4.49), to the normal form ˙ = Ax + Bv + ∞ NF : x
∞
f¯ [m] (x, v)
m=2
where for any m ≥ 2, we have f¯ [m] (x, v) =
p r−1 k=1 j=dk +1
∂ f¯jk[m] (x, v) ∂xk,j
(4.51)
with
f¯jk[m] (x, v) =
r+1
k[m−2] s xs,i xt,i Pj,i,s,t πt,i (x)
1≤s≤t≤p i=j+2
+
r+1
s xs,i xt,i−1 Qk[m−2] πt,i−1 (x) j,i,s,t
(4.52)
1≤s
for any 1 ≤ k ≤ p and any dk + 1 ≤ j ≤ r − 1. k[m−2] The functions Pj,i,s,t and Qk[m−2] stand for homogeneous polynomials of j,i,s,t k[m−2] (resp. Qk[m−2] degree m − 2 of the indicated variables; Pj,i,s,t j,i,s,t ) being equal to zero for 1 ≤ i ≤ ds (resp. 1 ≤ i ≤ ds + 1).
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
201
Notice that when p = 1, that is, if we deal with single-input control systems, then the homogeneous polynomials Qk[m−2] are zero, v = n, and thus the j,i,s,t normal form reduces to the non-affine of Kang normal form given by
f¯j[m] (x, v) =
r+1
r+1 [m−2] 2 k[m−2] 1 x1,i Pj,i,1,1 π1,i (x) = xi2 Pj,i (¯xi )
i=j+2
i=j+2
Two-input control systems: the normal form for two-input control systems with controllable linearization was obtained before [86] and deduces as the following corollary from Theorem 20 by taking p = 2. COROLLARY 3
The control system ∞ , defined by (4.50) with p = 2, is feedback equivalent, by a formal feedback transformation ϒ ∞ of the form (4.49), to the normal form
˙ = Ax + Bv + ∞ NF : x
∞
f¯ [m] (x, v)
m=2
where for any m ≥ 2, we have
f¯ [m] (x, v) =
r−1 j=d1 +1
r−1 ∂ ∂ + f¯j1[m] (x, v) f¯j2[m] (x, v) ∂x1, j ∂x2, j j=d2 +1
with,
f¯jk[m] (x, v) =
r+1
2 k[m−2] 2 x1,i Pj,i (¯x1,i , x¯ 2,i−1 ) + x2,i Qk[m−2] (¯x1,i−1 , x¯ 2,i ) j,i
i=j+2
+
r
k[m−2] (¯x1,i , x¯ 2,i ) + x1,i x2,i−1 Sk[m−2] (¯x1,i−1 , x¯ 2,i−1 ) x1,i x2,i Rj,i j,i
i=j+2
for any k = 1, 2 and any dk + 1 ≤ j ≤ r − 1. k[m−2] The homogeneous polynomials Pj,i , Qk[m−2] , and Sk[m−2] being equal to j,i j,i zero for 1 ≤ i ≤ d1 .
0882-Perruquetti-ch04_R2_180805
202
Feedback Equivalence of Nonlinear Control Systems
4.8.2 Affine Normal Forms Here we consider the action of ∞ , given by
x = φ(ξ ) = Tξ +
∞
φ [m] (ξ )
m=2
∞ :
∞
α [m] (ξ ) + β [m−1] (ξ )v
u = α(ξ ) + β(ξ )v = Kξ + Lv +
(4.53)
m=2
on multi-input ∞ , given by
∞ : ξ˙ = Aξ + Bu +
∞
f [m] (ξ ) + g[m−1] (ξ )u
(4.54)
m=2
where we assume the linear part to be already in the Brunovský canonical form (A, B) (see (4.48)). The main result of [88] in the affine case is next described. THEOREM 21
1. The formal system ∞ , defined by (4.54), is feedback equivalent, by a formal feedback transformation ∞ of the form (4.53), to the normal form ∞ NF : x˙ = Ax + Bv
+
∞
[m−1] (x)vp−1 f¯ [m] (x) + g¯ 1[m−1] (x)v1 + · · · + g¯ p−1
m=2
where for any m ≥ 2, the vector field f¯ [m] (x) and the vector fields g¯ s[m−1] (x), for 1 ≤ s ≤ p − 1, are given by
f¯ [m] (x) =
p r−1 k=1 j=dk +1
g¯ s[m−1] (x)
=
p r−1 k=1 j=dk +1
∂ , f¯jk[m] (x) ∂xk,j k[m−1] g¯ s,j (x)
∂ ∂xk,j
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
203
with r
f¯jk[m] (x) =
k[m−2] s πt,i (x) xs,i xt,i Pj,i,s,t
1≤s≤t≤p i=j+2
+
r
s πt,i−1 (x) xs,i xt,i−1 Qk[m−2] j,i,s,t
1≤s
and k[m−1] (x) g¯ s,j
=
p
s xt,r Qk[m−2] j,r+1,s,t πt,r (x)
t=s+1
for any 1 ≤ k ≤ p and any dk + 1 ≤ j ≤ r − 1. 2. Moreover, if the formal distribution ∞ ∞ [m−1] G ∞ = span B1 + g1 , . . . , Bp + gp[m−1] m=2
m=2
is involutive, then the homogeneous polynomials Qk[m−2] j,r+1,s,t are equal to zero, that is, the normal form reduces to ∞ NF : x˙ = Ax + Bv +
∞
f¯ [m] (x)
m=2
REMARK 2
Note that only p − 1 control vector fields are present in the normal form, the control vector field gp being normalized to (0, . . . , 0, 1)T . This is what happens in the single-input case. If we take p = 1, then all homogeneous control vector fields g¯ s[m−1] (x), as well as the homogeneous polynomials s Qk[m−2] j,i,s,t (πt,i−1 (x)) are not present in the aforementioned normal form. Thus, the normal form given by Theorem 21 reduces to the Kang normal form. In item (2) we rediscover a well-known result: if a nonsingular distribution is involutive, there are coordinates that normalize the whole distribution to a constant one.
4.8.3
Examples
In this section, we will illustrate the theory of normal forms for multiinput control systems by considering three physical examples. We will first treat the case of a model of a crane, then a prototype of a planar vertical
0882-Perruquetti-ch04_R2_180805
204
Feedback Equivalence of Nonlinear Control Systems
takeoff and landing aircraft, and finally we will consider the model of a multi-vehicle wireless testbed presented by Caltech.
Example 12 (Model of a crane) Consider the following model of a crane borrowed from earlier work [16, 18]. The state equations are z˙ 1 = z2 z˙ 2 = −
2z2 ˙ cos z1 g sin z1 − R−d R R R
where z1 is the angle between the rope and the vertical axis, z2 the angular velocity, R the length of the rope, and d the trolley acceleration. We aim to control R˙ = u1 and d˙ = u2 (notice that in Ref. [18] controls are R ¨ We consider the system around the equilibrium point and D, where d = D). z10 = z20 = d0 = 0, R0 = 1. The linear approximation is controllable with controllability indices r1 = 1 and r2 = 3. Then d1 = 2 and d2 = 0. Introduce the coordinates ξ1,3 = R − R0 = R − 1 ξ2,1 = z1 ξ2,2 = z2 ξ2,3 = d in which the system takes the form ξ˙1,3 = u1 ξ˙2,1 = ξ2,2 ξ˙2,2 = −
cos ξ2,1 g sin ξ2,1 2ξ2,2 − ξ2,3 − u1 1 + ξ1,3 1 + ξ1,3 1 + ξ1,3
ξ˙2,3 = u2 To bring this system to its normal form, we rectify the involutive distribu2ξ tion G = span{ g1 , g2 }, with g1 = (1, 0, − 1+ξ2,21,3 , 0)T and g2 = (0, 0, 0, 1)T , and 2 by taking we normalize the component f2,2
x1,3 = ξ1,3 x2,1 = ξ2,1 x2,2 = ξ2,2 (1 + ξ1,3 )2 x2,3 = −(1 + ξ1,3 )(g sin ξ2,1 + ξ2,3 cos ξ2,1 )
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
205
followed by a suitable feedback. This yields x˙ 1,3 = u1 2 x˙ 2,1 = x2,2 − 2x1,3 x2,2 + 3x1,3
x2,2 (1 + x1,3 )2
x˙ 2,2 = x2,3 x˙ 2,3 = u2 which is in a normal form (compare with Corollary 3), where all homok[m−2] k[m−2] geneous polynomials Pj,i , Qk[m−2] , Rj,i , and Sk[m−2] are equal to j,i j,i 2[m−2] , for zero except for S2[0] 1,1 = −2 and the homogeneous polynomials P1,1 m ≥ 3, which are equal to the homogeneous parts of degree m − 2 of the function 3x2,2 /(1 + x1,3 )2 .
Example 13 (PVTOL aircraft) In this example, we consider the prototype of a planar vertical takeoff and landing (PVTOL) aircraft. The equations of motion of the PVTOL [92] are given by x¨ = − sin θu1 + ε 2 cos θu2 y¨ = cos θu1 + ε 2 sin θu2 − 1 θ¨ = u2 where (x, y) denotes the position of the center mass of the aircraft, θ the angle of the aircraft relative to the x-axis, “−1” the gravitational acceleration, and ε = 0 the (small) coefficient giving the coupling between the rolling moment and the lateral acceleration of the aircraft. The control inputs u1 and u2 are the thrust (directed out the bottom of the aircraft) and the rolling moment. We introduce the variables ξ1,1 = y,
ξ1,2 = y˙
ξ2,1 = x,
ξ2,2 = x˙
ξ2,3 = θ,
ξ2,4 = θ˙
w1 = u1 − 1,
w2 = u2 .
0882-Perruquetti-ch04_R2_180805
206
Feedback Equivalence of Nonlinear Control Systems
The equations of motion of the PVTOL become ξ˙1,1 = ξ1,2 ξ˙1,2 = cos ξ2,3 w1 + ε 2 sin ξ2,3 w2 + cos ξ2,3 − 1 ξ˙2,1 = ξ2,2 ξ˙2,2 = − sin ξ2,3 w1 + ε 2 cos ξ2,3 w2 − sin ξ2,3
(4.55)
ξ˙2,3 = ξ2,4 ξ˙2,4 = w2 The equilibria of the system are defined by e e e e e e ξ1,1 , ξ1,2 , ξ2,1 , ξ2,2 , ξ2,3 , ξ2,4 , w1e , w2e
T
= (c, 0, 0, 0, 0, 0, 0, 0)T
where c is any constant. The linearization of the system (4.55) around the equilibria is given by ξ˙1,1 = ξ1,2 ξ˙1,2 = w1 ξ˙2,1 = ξ2,2 ξ˙2,2 = −ξ2,3 + ε 2 w2 ξ˙2,3 = ξ2,4 ξ˙2,4 = w2 It is easy to see that the linear system is controllable with controllability indices r1 = 2 and r2 = 4, and hence d1 = 2 and d2 = 0. The change of coordinates given by x1,3 = ξ1,1 − ε
ξ2,3
2 0
dt cos t
x1,4 = ξ1,2 + ξ1,2 tan ξ2,3 −
ε2 ξ2,4 cos ξ2,3
x2,1 = ξ2,1 x2,2 = ξ2,2 x2,3 = − tan ξ2,3 x2,4 = −ξ2,4 (1 + tan2 ξ2,3 ) = x˙ 2,3
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
207
followed by the feedback w1 =
v1 1 − ε 2 v2 tan ξ2,1 + −1 cos ξ2,1 cos ξ2,1
2 v2 = x˙ 2,4 = −w2 (1 + tan2 ξ2,3 ) − 2ξ2,4 tan ξ2,3 (1 + tan2 ξ2,3 )
takes the system into the following one x˙ 1,3 = x1,4 x˙ 1,4 = v1 x˙ 2,1 = x2,2 + x1,4 x2,3
2 2 x˙ 2,2 = x2,3 − x1,4 x2,4 + ε 2 1 − x2,3 x2,4 x˙ 2,3 = x2,4 x˙ 2,4 = v˜ 2 This system is in normal form (compare with Corollary 3), with Q2[0] 1,4,1,2 (x) = 1,
2[0] P2,4,1,2 (x) = −1,
2[0] P2,4,2,2 (x) = ε2 ,
2[2] 2 P2,4,2,2 (x) = −ε2 x2,3
Example 14 (Multi-Vehicle Wireless Testbed) We consider the Caltech Multi-Vehicle Wireless Testbed, presented elsewhere [15, 17] and we study the normal form of one vehicle. The equations of motion of an MVWT vehicle [15, 17] are given by m¨x = −ηx˙ + (Fs + Fp ) cos θ m¨y = −ηy˙ + (Fs + Fp ) sin θ J θ¨ = −ψ θ˙ + (Fs − Fp )l where (x, y) denotes the position of the center mass of the vehicle, θ the angle of the axis of the vehicle with the x-axis, m the mass of the vehicle, J the rotational inertia, Fs and Fp denote, respectively, the starboard and port fan forces, and l (r in [15, 17]) the common moment arm of the forces. The center mass of the vehicle and the center of geometry are assumed to coincide. The constants η and ψ stand, respectively, for the coefficients of viscous friction and rotational friction. Let us introduce the variables ξ0,1 = y,
ξ0,2 = y˙ ,
ξ1,1 = x,
ξ1,2 = x˙ ,
ξ2,1 = θ,
˙ ξ2,2 = θ,
u1 = Fs + Fp ,
u2 = Fs − Fp .
0882-Perruquetti-ch04_R2_180805
208
Feedback Equivalence of Nonlinear Control Systems
The equations of motion of an MVWT vehicle can be rewritten as ξ˙0,1 = ξ0,2 ξ˙0,2 = −ηξ0,2 + u1 sin ξ2,1 ξ˙1,1 = ξ1,2
(4.56)
ξ˙1,2 = −ηξ1,2 + u1 cos ξ2,1 ξ˙2,1 = ξ2,2 ξ˙2,2 = −ψξ2,2 + u2 l
We can notice that the system is affine and its distribution G = span{g1 , g2 }, where g1 = (0, sin ξ2,1 , 0, cos ξ2,1 , 0, 0)T
and g2 = (0, 0, 0, 0, 0, 1)T
is involutive and of constant rank 2. An equilibrium point for the system e , ξ e , ξ e )T . (4.56) is any constant position and orientation (xc , yc , θc )T = (ξ1,1 0,1 2,1 The linearization of the system (4.56) around an equilibrium (we assume θc = 0) is given by ξ˙0,1 = ξ0,2 ξ˙0,2 = −ηξ0,2 ξ˙1,1 = ξ1,2 ξ˙1,2 = −ηξ1,2 + u1 ξ˙2,1 = ξ2,2 ξ˙2,2 = −ψξ2,2 + u2 l It is easy to see that this linear system is not controllable because span{Fi Gk , 0 ≤ i ≤ 5, 1 ≤ k ≤ 2} = R4 where
0
0 0 F= 0 0 0
1
0
0
0
−η
0
0
0
0
0
1
0
0
0
−η
0
0
0
0
0
0
0
0
0
0
0 0 , 0 1 −ψ
0 0 0 G1 = 1 , 0 0
0 0 0 and G2 = 0 . 0 1
0882-Perruquetti-ch04_R2_180805
4.8
Normal Forms for Multi-Input Nonlinear Control Systems
209
The feedback transformation defined by u1 =
1 ξ1,2 v1 + η cos ξ2,1 cos ξ2,1
and v2 =
ψ u2 + ξ2,2 l l
takes the system into the following one ξ˙0,1 = ξ0,2 ξ˙0,2 = −ηξ0,2 + ηξ1,2 tan ξ2,1 + u1 tan ξ2,1 ξ˙1,1 = ξ1,2 ξ˙1,2 = v1 ξ˙2,1 = ξ2,2 ξ˙2,2 = v2 The change of coordinates given by x0,1 = ξ0,1 x0,2 = ξ0,2 − ξ1,2 tan ξ2,1 x1,1 = ξ1,1 x1,2 = ξ1,2 x2,1 = ξ2,1 x2,2 = ξ2,2 brings the system into the normal form x˙ 0,1 = x0,2 + x1,2 tan x2,1 x˙ 0,2 = −ηx0,2 − x1,2 x2,2 (1 + tan2 x2,1 ) x˙ 1,1 = x1,2 x˙ 1,2 = v1 x˙ 2,1 = x2,2 x˙ 2,2 = v2 Here, the linearly controllable part is feedback linearizable because the indices of controllability are r1 = r2 = 2.
0882-Perruquetti-ch04_R2_180805
210
4.9
Feedback Equivalence of Nonlinear Control Systems
Feedback Linearization
In this section, we will discuss the feedback linearization problem. We will recall the well-known result characterizing feedback linearizability in terms of involutivity of certain distributions and compare it with a condition using the homogeneous m-invariants. Then we will consider systems with uncontrollable linearization and, similarly, we will compare a geometric condition involving the involutivity of suitable distributions with a condition using weighted homogeneous invariants. Finally, we will discuss feedback linearizability of general systems (i.e., not necessarily affine in controls). Consider a C∞ -smooth control-affine system of the form : ξ˙ = f (ξ ) +
m
gi (ξ )ui
i=1
where f (ξ0 ) = 0, which we will assume throughout this section. To state a feedback linearization result for , we define the following distributions D1 (x) = span {gi (x), 1 ≤ i ≤ m} q−1
Dj (x) = span {adf
gi (x), 1 ≤ q ≤ j, 1 ≤ i ≤ m},
for j ≥ 2. If the dimensions mj (x) of Dj (x) are constant (see (FL1) and (FL1) ) we denote them by mj and we define indices ρj as follows. Define m0 = 0 and put qj = mj − mj−1 for 1 ≤ j ≤ n. Then we define ρi = max{qj | qj ≥ i}
(4.57)
Clearly, we have ρ1 ≥ · · · ≥ ρm (and also m i=1 ρi = n if the linear part (F, G) of is controllable). For the linear controllable system ξ˙ = Fξ + Gu, the integers ρi ’s form the set of controllability indices (compare Example 1). We will be interested in feedback linearization, that is, in feedback equivalence of to a linear system of the form x˙ = Ax + Bv = Ax +
m
b i vi
i=1
under a feedback transformation x = φ(ξ ), u = α(ξ ) + β(ξ )v. The following result [36, 37, 45], see also [38, 66] describes control-affine systems that are locally feedback equivalent to linear controllable systems.
0882-Perruquetti-ch04_R2_180805
4.9
Feedback Linearization
211
THEOREM 22
The following conditions are equivalent: 1. is locally, at ξ0 ∈ Rn , feedback equivalent to a linear controllable system 2. satisfies in a neighborhood of ξ0 : (FL1) dim Dj (ξ ) = const, for 1 ≤ j ≤ n (FL2) the distributions Dj are involutive, for 1 ≤ j ≤ n (FL3) dim Dn (ξ0 ) = n 3. satisfies in a neighborhood of ξ0 : (FL1) dim Dj (ξ ) = const, for 1 ≤ j ≤ n (FL2) the distributions Dρj −1 are involutive, for 1 ≤ j ≤ m (FL3) dim Dρ1 (ξ0 ) = n, where ρ1 is the largest controllability index The conditions (FL1) –(FL3) involve the minimal number of distributions whose involutivity has to be checked. On the other hand, the conditions (FL1)–(FL3) are more transparent and do not require the calculation of controllability indices. In the single-input case m = 1, the condition (FL3) (or, equivalently, (FL3) ) states that g(ξ0 ), . . . , adn−1 g(ξ0 ) are independent, which implies that f all distributions Dj , for 1 ≤ j ≤ n, are of constant rank. In the single-input case, we have the following corollary of Theorem 22. COROLLARY 4
A single-input system is feedback linearizable if and only if it satisfies: (FL1)SI g(ξ0 ), . . . , adn−1 g(ξ0 ) are independent f (FL2)SI the distribution Dn−1 is involutive Now consider the single input-system , given by ξ˙ = f (ξ ) + g(ξ )u. Without loss of generality we assume that ξ0 = 0. Consider the infinite Taylor series expansion of given at ξ0 = 0 ∈ Rn by ∞ : ξ˙ = Fξ + Gu +
∞
f [m] (ξ ) + g[m−1] (ξ )u
m=2
Of course, a necessary condition for feedback equivalence of ∞ to a linear controllable system is that the linear part (F, G) of ∞ is controllable. So we can put it by a linear feedback transformation 1 into the Brunovský canonical form (A, B). Now consider the homogeneous system [m] : ξ˙ = Aξ + Bu + f [m] (ξ ) + g[m−1] (ξ )u
0882-Perruquetti-ch04_R2_180805
212
Feedback Equivalence of Nonlinear Control Systems
Recall that = {(j, i) ∈ N × N : 1 ≤ j ≤ n − 2, 0 ≤ i ≤ n − j − 2} and that, by definition, equivalence of m-homogeneous systems means equivalence modulo terms of degree higher than m (see Section 4.3). Theorem 3 and Theorem 4 imply the following result of Kang [50]: PROPOSITION 6
The homogenous system [m] is equivalent, via a homogeneous feedback transformation m , to the linear system x˙ = Ax + Bv if and only if a[m]j,i+2 = 0 ( j, i) ∈ , that is, all homogenous m-invariants vanish. This observation leads to the following linearization step-by-step procedure. Consider the system ∞ and apply a linear feedback transformation 1 bringing the linear part (F, G) into the Brunovský canonical form (A, B). Denote ∞,1 = ∗1 ( ∞ ). Now bring the homogenous system [2] [2] of ∞,1 into its normal form NF via a homogeneous transformation 2 . [2]j,i+2 If the 2-invariants a , ( j, i) ∈ , vanish then the system ∞,2 = ∗2 ( ∞,1 ) is linear modulo terms in V ≥3 . Notice that, although the transformation 2 is determined by the homogenous part [2] of ∞,1 only, we apply 2 to the whole system ∞,1 and thus we modify, in general, all terms of ∞,1 to get ∞,2 . Now suppose that a sequence of systems ∞,1 , . . . , ∞,m−1 has been defined, and ∞,m−1 is linear modulo terms in V ≥m . Bring the [m] via a homohomogenous system [m] of ∞,m−1 into its normal form NF m [m]j,i+2 geneous transformation . If the m-invariants a , ( j, i) ∈ , vanish then the system ∞,m = ∗m ( ∞,m−1 ) is linear modulo terms in V ≥m+1 . We thus have the following counterpart of Corollary 4. PROPOSITION 7
The system ∞ , with controllable linearization, is feedback equivalent via a formal feedback ∞ to a controllable linear system x˙ = Ax + Bv if and only if
0882-Perruquetti-ch04_R2_180805
4.9
Feedback Linearization
213
for any m ≥ 2 a[m]j,i+2 = 0 where ( j, i) ∈ and a[m]j,i+2 are m-invariants of the homogeneous system [m] of ∞,m−1 = ∗m−1 · · · ∗2 ∗1 ( ∞ ). Clearly, if a system is feedback linearizable (i.e., satisfies the conditions (FL1)SI and (FL2)SI of Corollary 4), then its infinite Taylor series expansion ∞ satisfies the conditions of Proposition 7. Now we will answer the important question of whether we can reverse this implication. PROPOSITION 8
Consider an analytic system , with a controllable linearization (F, G). Assume that a[m]j,i+2 = 0,
for any m ≥ 2
where ( j, i) ∈ and a[m]j,i+2 are m-invariants of the homogeneous system [m] of ∞,m−1 = ∗m−1 · · · ∗2 ∗1 ( ∞ ). Then is equivalent, via a local analytic feedback transformation , to a controllable linear system x˙ = Ax + Bv. An analogous result does not hold in the C∞ -category. To see this result consider, for example, the system ξ˙1 = ξ2 + f1 (ξn ) ξ˙2 = ξ3 .. . ξ˙n−1 = ξn ξ˙n = u where n ≥ 3 and f1 (ξn ) is a C∞ -smooth function such that all derivatives of f1 (ξn ) at 0 ∈ Rn vanish but the function does not vanish identically in a neighborhood. Clearly, all the invariants a[m]j,i+2 vanish but the system is not feedback linearizable because the distribution D2 = span {g, adf g} is not involutive. Now, we discuss the problem of feedback linearization of systems with uncontrollable linearization. We start with the following immediate generalization of Theorem 22.
0882-Perruquetti-ch04_R2_180805
214
Feedback Equivalence of Nonlinear Control Systems
PROPOSITION 9
A smooth (analytic) system , is locally at ξ 0 , equivalent via a smooth (analytic) feedback to x˙ 1 = f 1 (x1 ) x˙ 2 = Ax2 + Bv with (A, B) controllable (in Brunovský form), where (x1 , x2 ) = (x1,1 , . . . , x1,r , x2,1 , . . . , x2,n−r ) if and only if it satisfies around ξ 0 the conditions (FL1) and (FL2) of Theorem 22. Moreover, dim x2 = dim Dn (ξ 0 ) = n − r. In the single-input case we get the following. COROLLARY 5
A smooth (analytic) single-input system , is locally at ξ 0 , equivalent via a smooth (analytic) feedback to x˙ 1 = f 1 (x1 ) x˙ 2 = Ax2 + Bv with (A, B) controllable, if and only if it satisfies in a neighborhood of ξ 0 : (FUL1)SI dim Dn−r (ξ ) = dim Dn−r+1 (ξ ) = n − r (FUL2)SI the distribution Dn−r−1 is involutive If, additionally, (FUL3) the eigenvalues of J = (∂f 1 /∂x1 ) x10 are nonresonant, where 0 0 0 0 x0 = x10 , x20 = x1,1 , . . . , x1,r , x2,1 . . . , x2,n−r , then ∞ (the infinite series expansion of ) is equivalent to the linear system x˙ 1 = Jx1 x˙ 2 = Ax2 + Bv via a formal feedback ∞ . Note that to check (FUL3), we do not need to bring the system into the partially linear form x˙ 1 = f 1 (x1 ), x˙ 2 = Ax2 + Bv, (which would, in general, require solving a system of first-order PDEs). Indeed, the condition (FUL1)SI implies that [ f , Dn−r ] ⊂ Dn−r
0882-Perruquetti-ch04_R2_180805
4.10
Normal Forms for Discrete Time Control Systems
215
which in turn yields [Fξ , Dn−r ] ⊂ Dn−r where Fξ is the homogenous part of degree 1 of the vector field f and Dn−r is the homogenous part of degree 0 of the distribution Dn−r . In other words, the linear map F leaves the linear subspace Dn−r of Rn invariant. It follows that F passes to the quotient, that is, defines the map FDn−r : Rn /∼ → Rn /∼ , where x ∼ x¯ if and only if x − x¯ ∈ Dn−r . The eigenvalues of J are just the eigenvalues of FDn−r . To calculate them, find a linear map x = Tξ defining linear coordinates (x1 , x2 ) = (x1,1 , . . . , x1,r , x2,1 , . . . , x2,n−r ) such that Dn−r = span {∂/∂x2,1 , . . . , ∂/∂x2,n−r }. Express TFT −1 x = (F˜ 1 x, F˜ 2 x) then, clearly, F˜ 1 x = Jx1 and the eigenvalues of J are just the eigenvalues of FDn−r . Of course, the same analysis holds in the multi-input case. We will end this section by giving a C∞ -version of Corollary 5. Combining it with the linearizability results of Chen and Sternberg, we get the following: COROLLARY 6
If a C∞ -smooth system satisfies the conditions (FUL1)SI , (FUL2)SI , (FUL3) of Corollary 5, then it is equivalent to the linear system x˙ 1 = Jx1 x˙ 2 = Ax2 + Bv via a C∞ -smooth formal feedback . An analogous result in the analytic category is more restrictive and much more subtle and requires introducing the notion of Poincaré–Siegel domains [3].
4.10
Normal Forms for Discrete Time Control Systems
The method of normal forms has proved to be a useful approach in studying dynamical systems and control systems as illustrated throughout this chapter. The pioneer of this formal approach, Henri Poincaré, applied it to both continuous time dynamical systems (vector fields) and discrete time dynamical systems (maps) [67]. This chapter may sound incomplete if we omit to mention the work done for discrete time control systems. Normal forms for discrete time control systems have been studied using a similar approach to that presented in previous sections. Thus, quadratic and cubic
0882-Perruquetti-ch04_R2_180805
216
Feedback Equivalence of Nonlinear Control Systems
normal forms for discrete time control systems has been treated earlier [6, 30, 32, 61]. These normal forms have been utilized for stabilization of systems with uncontrollable linearization [27–29, 31, 33, 59–61]. Recently, a normal form, of any degree m, for discrete time control systems with controllable linearization was given by Hamzi and Tall [34]. We propose to explain briefly those results in this section. The problem is to study the action of a feedback transformation ϒ :
x = φ(ξ ) u = γ (x, v)
on a discrete time nonlinear control system : ξ + = f (ξ , u),
ξ ∈ Rn , u ∈ R
where ξ + = ξ(k + 1), and f (ξ , u) = f (ξ(k), u(k)) for any k ∈ N. The transformation ϒ brings to the system ˜ : x+ = f˜ (x, v) whose dynamics are given by f˜ (x, v) = φ(f (φ −1 (x), γ (x, v))) We suppose that (0, 0) ∈ Rn × R is an equilibrium point, that is, f (0, 0) = 0, and we denote by [1] : ξ + = Fξ + Gu its linearization at this point, where F=
∂F (0, 0), ∂ξ
G=
∂F (0, 0) ∂u
We will assume that this linearization is controllable, that is span{Fi G : 0 ≤ i ≤ n − 1} = Rn Let us consider the Taylor series expansion ∞ of the system , given by ∞ : ξ + = Fξ + Gu +
∞ m=2
f [m] (ξ , u)
(4.58)
0882-Perruquetti-ch04_R2_180805
4.10
Normal Forms for Discrete Time Control Systems
217
and the Taylor series expansion ϒ ∞ of the feedback transformation ϒ, given by x = φ(ξ ) = Tξ +
∞
φ [m] (ξ )
m=2
ϒ∞ :
∞
u = γ (ξ , v) = Kξ + Lv +
(4.59) γ
[m]
(ξ , v)
m=2
Throughout this section, and in particular in formula (4.58) and formula (4.59), the homogeneity of f [m] and γ [m] will be taken with respect to the variables (ξ , u)T and (ξ , v)T , respectively. We first notice that, because of the controllability assumption, there always exists a linear feedback transformation ϒ1 :
x = Tξ u = Kξ + Lv
bringing the linear part [1] : ξ + = Fξ + Gu into the Brunovsky` canonical form + [1] CF : x = Ax + Bv
Then we study, successively for m ≥ 2, the action of the homogeneous feedback transformations ϒ
m
:
x = ξ + φ [m] (ξ ) u = v + γ [m] (ξ , v)
(4.60)
on the homogeneous systems [m] : ξ + = Aξ + Bu + f [m] (ξ , u)
(4.61)
Consider another homogeneous system ˜ [m] : x+ = Ax + Bv + f˜ [m] (x, v)
(4.62)
We say that the homogeneous system [m] , given by (4.61), ˜ [m] , given by (4.62), if is feedback equivalent to the homogeneous system
DEFINITION 2
0882-Perruquetti-ch04_R2_180805
218
Feedback Equivalence of Nonlinear Control Systems
there exist a homogeneous feedback transformation ϒ m , of the form (4.60), ˜ [m] modulo terms in P≥m+1 . which brings the system [m] into the system
The following proposition is the analogue, for discrete time control systems, of Proposition 2, stated for continuous systems. It establishes the conditions of equivalence of two homogeneous systems. PROPOSITION 10
The homogeneous feedback transformation ϒ m , defined by (4.60), brings the homo˜ [m] , given geneous system [m] , given by (4.61), into the homogeneous system by (4.62), if and only if the following relations [m] (ξ ) = f˜j[m] (ξ , u) − fj[m] (ξ , u) φj[m] (Aξ + Bu) − φj+1
φn[m] (Aξ + Bu) + γ [m] (ξ ) = f˜n[m] (ξ , u) − fn[m] (ξ , u) hold for all 1 ≤ j ≤ n − 1. The proof of this proposition is straightforward. Main results. Let us denote the control by v = xn+1 , and for any 1 ≤ i ≤ n + 1, πi (x) = (x1 , . . . , xi ) The main result for discrete time nonlinear control systems with controllable linearization is given in the following theorem. THEOREM 23
The homogeneous control system [m] , defined by (4.61), is feedback equivalent, by a homogeneous feedback transformation ϒ m of the form (4.60), to the normal form [m] : x+ = Ax + Bv + f¯ [m] (x, v) NF
where the components of the map f¯ [m] (x, v) are given by [m−2] n+1 (πi (x)) if 1 ≤ j ≤ n − 1 i=j+2 x1 xi Pj,i ¯f [m] (x, v) = j 0 if j = n
(4.63)
We can notice the similarity of this normal form with that of continuous [m−2] (πi (x)), systems (4.8) with the notable difference that the polynomials Pj,i instead of being multiplied by xi2 , are multiplied by x1 xi . As the homogeneous feedback transformations ϒ m leave the terms of degree less than
0882-Perruquetti-ch04_R2_180805
4.10
Normal Forms for Discrete Time Control Systems
219
m invariant, a successive application of Theorem 23 gives the following corollary. COROLLARY 7
The control system ∞ , defined by (4.58), is feedback equivalent, by a formal feedback transformation ϒ ∞ of the form (4.59), to the normal form + ∞ NF : x = Ax + Bv +
∞
f¯ [m] (x, v)
m=2
where for any m ≥ 2, the components of the map f¯ [m] (x, v) are given by (4.63). To illustrate our results, we consider the following example of a pendulum described elsewhere [83].
4.10.1
Example: Bressan and Rampazzo Pendulum
Consider the Bressan and Rampazzo pendulum [10, 83] described by the equations (see Example 7) ξ˙1 = ξ2 ξ˙2 = −g sin ξ3 + ξ1 ξ42 ξ˙3 = ξ4 ξ˙4 = u where ξ1 denotes the length of the pendulum, ξ2 its velocity, ξ3 the angle of the pendulum with respect to the horizontal, ξ4 its angular velocity, and g the gravity constant. We discretize the system by taking ξ˙1 = ξ1+ − ξ1 ,
ξ˙2 = ξ2+ − ξ2 ,
ξ˙3 = ξ3+ − ξ3 ,
The system rewrites ξ1+ = ξ1 + ξ2 ξ2+ = ξ2 − g sin ξ3 + ξ1 ξ42 ξ3+ = ξ3 + ξ4 ξ4+ = ξ4 + u
ξ˙4 = ξ4+ − ξ4
0882-Perruquetti-ch04_R2_180805
220
Feedback Equivalence of Nonlinear Control Systems
Consider the change of coordinates z1 = ξ1 z2 = ξ2 + ξ1 z3 = −g sin ξ3 + 2ξ2 + ξ1 z4 = −g sin(ξ4 + ξ3 ) + 3ξ2 − 2g sin ξ3 + 2ξ1 ξ42 + ξ1 v = z4+ whose inverse is such that ξ4 = h(z1 , z2 , z3 , z4 ) is a smooth function. This change of coordinates takes the system into the form z1+ = z2 z2+ = z3 + z1 h2 (z1 , z2 , z3 , z4 ) z3+ = z4 z4+ = v The function h2 (z1 , z2 , z3 , z4 ) could be decomposed as h2 (z1 , z2 , z3 , z4 ) = h1 (z1 , z2 , z3 ) + z4 h2 (z1 , z2 , z3 , z4 ) where the 1-jet at 0 of h1 is zero and h2 (0) = 0. Put H1 (z1 , z2 , z3 ) = z1 h1 (z1 , z2 , z3 ). The objective is to show that we can get rid of the terms H1 (z1 , z2 , z3 ). Let us suppose that the k-jet at 0 of H1 is zero. Consider the change of coordinates z˜ 1 = z1 , z˜ 2 = z2 , z˜ 3 = z3 + H1 (z1 , z2 , z3 ), z˜ 4 = z˜ 3+ . This change of coordinates, completed by the feedback z˜ 4+ = w, takes the system into the form z˜ 1+ = z˜ 2 ˜ 1 (˜z1 , z˜ 2 , z˜ 3 ) + z˜ 1 z˜ 4 H ˜ 2 (˜z1 , z˜ 2 , z˜ 3 , z˜ 4 ) z˜ 2+ = z˜ 3 + H z˜ 3+ = z˜ 4 z˜ 4+ = w ˜ 1 (˜z1 , z˜ 2 , z˜ 3 ) and H ˜ 2 (˜z1 , z˜ 2 , z˜ 3 , z˜ 4 ) are some smooth functions. It is where H ˜ 1 (˜z1 , z˜ 2 , z˜ 3 ) is zero because the enough to remark that the (k + 2)-jet at 0 of H 2-jet of z1 z4 H2 (z) is zero. Then by iteration we can cancel terms H1 (z1 , z2 , z3 )
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
221
and put the system into the desired normal form x1+ = x2 x2+ = x3 + x1 x4 H(x1 , x2 , x3 , x4 ) x3+ = x4 x4+ = v
4.11
Symmetries of Control Systems
∞ In this section, we will discuss relations between the canonical form CF given in Section 4.4 and symmetries of nonlinear control systems. Recently, there has been a growing interest in symmetries of nonlinear control systems. The structure of control systems possessing symmetries has been analyzed in several works [22, 24, 26]. The role of symmetries in the optimal control problems has been studied, among others, by Jurdjevic [47, 48] (for systems on Lie groups), van der Schaft [94], and Sussmann [93]. Jakubczyk [43] gave a complete characterization of symmetries in terms of symbols of control systems. In this section, we study symmetries of single-input nonlinear control affine systems whose linear approximation, at an equilibrium point p, is controllable. We will discuss two results of the authors devoted, respectively, to stationary symmetries [73] and nonstationary symmetries [72]. The first, given in Section 4.11.2, states that “almost any” single-input control system, which is truly nonlinear (i.e., nonlinearizable via feedback) does not admit any stationary symmetry (i.e., any symmetry preserving the equilibrium point p). “Almost any” refers to all systems away from a small class of odd systems which admit one nontrivial stationary symmetry that is conjugated to minus identity by a diffeomorphism bringing the ∞ of Section 4.4. In Section 4.11.3, for the system to its canonical form CF same class of systems and around an equilibrium point p, we study nonstationary symmetries (i.e., symmetries which do not preserve p). Our main result also states that for nonstationary symmetries a complete picture can be deduced from the canonical form. We prove that an analytic system, equivalent by an analytic feedback transformation to its canonical form, admits a nonstationary symmetry if and only if the drift vector field defining the canonical form is periodic with respect to the first variable and that a system admits a 1-parameter family of symmetries if and only if that drift vector field does not depend on the first variable. Moreover, we show that in the latter case the set of all symmetries is given either by exactly one 1-parameter family of symmetries (in the non-odd case) or by exactly
0882-Perruquetti-ch04_R2_180805
222
Feedback Equivalence of Nonlinear Control Systems
two 1-parameter families of symmetries (in the odd case). In the case when the feedback transformation, bringing the system to its canonical form, is given by a (not necessarily convergent) formal power series, we state in Section 4.11.4 that an analogous result holds for a formal infinitesimal symmetry. In fact, its existence is equivalent to the fact that the drift of the formal canonical form does not depend on the first variable. We will also describe in Section 4.11.5 all symmetries of feedback linearizable systems [22, 24, 70] to show an enormous gap between the group of symmetries of feedback linearizable and nonlinearizable systems.
4.11.1
Symmetries
In this section, we will introduce the notion of symmetries of nonlinear control systems [26, 43, 73, 94]. Let us consider the system : x˙ = F(x, u) where x ∈ X, a smooth n-dimensional manifold and u ∈ U, a smooth m-dimensional manifold. The map F : X × U −→ TX is assumed to be smooth with respect to (x, u) and for any value u ∈ U of the control parameter, F defines a smooth vector field Fu on X, where Fu (·) = F(·, u). Consider the field of admissible velocities F associated to the system and defined as (see Section 4.1) F(x) = {Fu (x) : u ∈ U} ⊂ Tx X We say that a diffeomorphism σ : X −→ X is a symmetry of if it preserves the field of admissible velocities F, that is, σ∗ F = F Recall that for any vector field f on X and any diffeomorphism y = φ(x) of X, we put (φ∗ f )(y) = Dφ(φ −1 ( y)) · f (φ −1 ( y)) ˜ 0, A local symmetry at p ∈ X is a local diffeomorphism σ of X0 onto X ˜ where X0 and X0 are, respectively, neighborhoods of p and σ (p), such that (σ∗ F )(q) = F(q) ˜ 0. for any q ∈ X A local symmetry σ at p is called a stationary symmetry if σ (p) = p and a nonstationary symmetry if σ (p) = p.
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
223
Let us consider a single-input control affine system : x˙ = f (x) + g(x)u where x ∈ X, u ∈ U = R and f and g are smooth vector fields on X. The field of admissible velocities for the system is the following field of affine lines: A(x) = { f (x) + ug(x) : u ∈ R} ⊂ Tx X Aspecification of the aforementioned definition says that a diffeomorphism σ : X −→ X is a symmetry of if it preserves the affine line field A (in other words, the affine distribution A of rank 1), that is, if σ∗ A = A We will call p ∈ X to be an equilibrium point of if 0 ∈ A(p). For any equilibrium point p there exists a unique u˜ ∈ R such that f˜ (p) = 0, where ˜ f˜ (p) = f (p) + ug(p). By the linear approximation of at an equilibrium p we will mean the pair (F, G), where F = (∂ f˜ /∂x)(p) and G = g(p). We will say that is an odd system at p ∈ X if it admits a stationary symmetry at p, denoted by σ − , such that ∂σ − (p) = −Id ∂x
4.11.2
Symmetries of Single-Input Nonlinearizable Systems
In this section, we deal with single-input control affine systems of the form : x˙ = f (x) + g(x)u where x ∈ X and u ∈ R. Our analysis will be local so we can assume that X = Rn . Throughout this section, we will assume that the point p around which we work is an equilibrium, that is f (p) = 0 and, moreover, that g(p) = 0. We will prove that if is not feedback linearizable (see Section 4.9), then the group of local symmetries of around an equilibrium p ∈ Rn is very small. More precisely, the following result of the authors [72, 73] says that if is analytic, then it admits at most two 1-parameter families of local symmetries. We will say that σc , where c ∈ (−ε, ε) ⊂ R, is a nontrivial 1-parameter analytic family of local symmetries if each σc is a local analytic symmetry, σc1 = σc2 if c1 = c2 , and σc (x) is jointly analytic with respect to (x, c). Assume that the system is analytic. If the feedback transformation ∞ , is analytic then = (φ, α, β), bringing ∞ into its canonical form CF
0882-Perruquetti-ch04_R2_180805
224
Feedback Equivalence of Nonlinear Control Systems
we will denote the analytic canonical form of by CF . (i.e., the analytic ∞ ). system whose infinite Taylor expansion is given by CF THEOREM 24
Assume that the system is analytic, the linear approximation (F, G) of at an equilibrium point p is controllable and that is not locally feedback linearizable at p. Assume, moreover, that the local feedback transformation, bringing into its canonical form CF is analytic at p. Then there exists a local analytic diffeomorphism φ : X0 → Rn , where X0 is a neighborhood of p, with the following properties: 1. If σ is a local analytic stationary symmetry of at p, then either σ = Id or φ ◦ σ ◦ φ −1 = −Id 2. If σ is a local analytic nonstationary symmetry of at p, then φ ◦ σ ◦ φ −1 = Tc where c ∈ R and Tc is either the translation Tc = (x1 + c, x2 , . . . , xn ) or Tc is replaced by Tc− = Tc ◦ (−Id) = (−x1 + c, −x2 , . . . , −xn ). 3. If σc , c ∈ (−ε, ε) is a nontrivial 1-parameter analytic family of local symmetries of at p, then φ ◦ σc ◦ φ −1 = Tc where Tc is as above, for c ∈ (−ε, ε).
If we drop the assumption that is equivalent to its canonical form CF by an analytic feedback transformation, then items (1) and (3) remain valid, with the local analytic diffeomorphisms φ being replaced by a formal diffeomorphism. This implies that the group of stationary symmetries of an analytic single-input control system is very small. Indeed, we have the following: COROLLARY 8
Consider an analytic single-input control system and assume that it is not feedback linearizable and its linear approximation at an equilibrium point p is controllable. Then possesses at most two analytic stationary symmetries at p: an identity and, if is odd, a symmetry σ − satisfying (∂σ − /∂x)(p) = −Id.
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
4.11.3
225
Symmetries of the Canonical Form
Symmetries take a very simple form if we bring the system into its canonical form. Indeed, we have the following result obtained by the authors ([72, 73] for proofs and details). PROPOSITION 11
Assume that the system is analytic, the linear approximation (F, G) of at an equilibrium point p is controllable and is not locally feedback linearizable at p. Assume, moreover, that the local feedback transformation, bringing into its canonical form CF , is analytic at p: 1. admits a nontrivial local stationary symmetry if and only if the drift ¯ [m] (x) of the canonical form ∞ satisfies f¯ (x) = Ax + ∞ m=m0 f CF f¯ (x) = −f¯ (−x) that is, the system is odd. 2. admits a nontrivial local nonstationary symmetry if and only if the drift ∞ satisfies f¯ (x) of the canonical form CF f¯ (x) = f¯ (Tc (x)) that is f¯ is periodic with respect to x1 . 3. admits a nontrivial local 1-parameter family of symmetries if and only if ∞ satisfies the drift f¯ (x) of the canonical form CF f¯ (x) = f¯ (x2 , . . . , xn ) This result describes all symmetries around an equilibrium of any single-input nonlinear system that is not feedback linearizable and whose first-order approximation at the equilibrium is controllable. If we drop the assumption that is equivalent to its canonical form CF by an analytic feedback transformation, then the “only if” statements in items (1) and (3) remain valid while in the “if” statements we have to replace local symmetries by formal symmetries, that is, by formal diffeomorphisms which preserve the field of admissible velocities [71], which we will do in the next section.
4.11.4
Formal Symmetries
We do not know whether, in general, the feedback transformation ∞ ∞ converges. If it does, Theobringing the system to its canonical form CF rem 24 and Proposition 11 describe all local symmetries of . If it does not,
0882-Perruquetti-ch04_R2_180805
226
Feedback Equivalence of Nonlinear Control Systems
∞ is considered as a formal power series but even in the canonical form CF this case it keeps, as we will show in the following, important information about symmetries. We say that a vector field v on an open subset X ⊂ Rn is an infinitesimal symmetry of the system if the (local) flow γtv of v is a local symmetry of , for any t for which it exists. Consider the system and denote by G the distribution spanned by the vector field g. We have the following characterization of infinitesimal symmetries.
PROPOSITION 12
A vector field v is an infinitesimal symmetry of if and only if [v, f ] = 0 mod G,
[v, g] = 0 mod G
This characterization of infinitesimal symmetries justifies the following notion. We say that a vector field formal series v∞ (ξ ) =
∞
v[m] (ξ )
m=0
is a formal infinitesimal symmetry of the system ∞ : ξ˙ = f (ξ ) + g(ξ )u =
∞
f [m] (ξ ) + g[m−1] u
m=1
if it satisfies [v∞ , f ] = 0 mod G,
[v∞ , g] = 0 mod G
Here, [·, ·] is understood as the Lie bracket of formal power series vector fields. THEOREM 25
Consider the system ∞ . Assume that its linear approximation (F, G) is controllable and that ∞ is not feedback linearizable. The following conditions are equivalent: 1. ∞ admits a formal infinitesimal symmetry. 2. The only formal infinitesimal symmetry of ∞ is v∞ = (φ −1 )∗ (∂/∂x1 ), where φ is the diffeomorphism defining a feedback transformation ∞ that ∞. brings ∞ into its canonical form CF
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
227
∞ of ∞ satisfies f¯ [m] (x) = f¯ [m] (x , . . . , x ), for any 3. The canonical form CF n 2 m ≥ m0 , where the vector fields f¯ [m] are of the form (4.17)–(4.19).
4. For any c1 ∈ R, the translation Tc1 (x) = (x1 + c1 , x2 , . . . , xn )T is a symme∞. try of the canonical form CF
∞ = ∂/∂x is a formal infinitesimal symmetry of the 5. The vector field vCF 1 ∞ canonical form CF .
This result, established in the formal category, provides the following necessary condition for the existence of analytic 1-parameter families of symmetries. Note that in the following we do not assume that the feedback ∞ , converges. transformation ∞ , bringing to its canonical form CF PROPOSITION 13
Consider an analytic system and assume that its linear approximation is controllable and the system is not feedback linearizable. If admits a nontrivial analytic local 1-parameter group of symmetries σc1 , for c1 ∈ (−ε, ε), then the drift ∞ satisfies f¯ [m] (x) = f¯ [m] (x , . . . , x ), for any vector field of the canonical form CF n 2 m ≥ m0 . We will end this section by giving a necessary condition for the existence of a family of local nonstationary symmetries which does not require to bring the system to its canonical form but only to normalize a finite number of terms. Let m0 denote the largest nonnegative integer such that for any 1 ≤ k ≤ n, the distributions Dk = (g, adf g, . . . , adk−1 g) have constant rank k and are f involutive modulo terms of order m0 − 2. It follows that the system is feedback linearizable up to order m0 − 1 [56]. We can thus bring the system to the form ˜ : x˙ = Ax + Bu + f¯ [m0 ] (x) + R(x, v)
(4.64)
where R(x, v) ∈ V(x, v)≥m0 +1 and (A, B) is in the Brunovský canonical form and the first nonlinearizable homogeneous vector field f¯ [m0 ] whose components are given by n 2 [m0 −2] (x , . . . , x ) if 1 ≤ j ≤ n − 2 1 i [m ] i=j+2 xi Pj,i f¯j 0 (x) = (4.65) 0 if n − 1 ≤ j ≤ n is in Kang normal form [m0 ] . PROPOSITION 14
Under the assumptions of Proposition 13, if f¯ [m0 ] (x) depends on x1 then does not admit any nontrivial analytic local 1-parameter group of symmetries.
0882-Perruquetti-ch04_R2_180805
228
Feedback Equivalence of Nonlinear Control Systems
We would like to emphasize that the aforementioned condition is checkable via an algebraic calculation. In fact, bringing the terms of degree smaller than m0 of to their Kang normal form means simply to annihilate them (compare Section 4.9). In Section 4.3, we gave explicit polynomial transformations that bring a homogenous part of any degree of a system to Kang normal form [m0 ] . Therefore, a successive use of those polynomial ˜ for which we can transformations, of degree 2 up to m0 , brings into apply Proposition 14.
4.11.5
Symmetries of Feedback Linearizable Systems
In the previous section, we proved that the group of symmetries of feedback nonlinearizable systems around an equilibrium is very small provided that the linear approximation at the equilibrium is controllable. A natural question is thus what are symmetries of feedback linearizable systems? In this section, we will show that symmetries of such systems form an infinite dimensional group parameterized by m arbitrary functions of m variables, where m is the number of controls. It is interesting to observe that just one nonlinearity, which is not removable by feedback, destroys this infinite dimensional group leaving, at most, two one-parameter families of symmetries (compare Theorem 24). We will describe symmetries of linear systems in Brunovský canonical form and then of feedback linearizable systems. For the sake of simplicity, we will deal with systems with all controllability indices equal. Another description of symmetries of linear systems in Brunovský canonical form was given elsewhere [22, 24]. Consider a linear control system in the Brunovský canonical form with all controllability indices equal, say to n, x˙ 1 = x2
:
.. . x˙ n−1 = xn x˙ n = v
on RN , where dim v = m, dim xj = n, N = nm. Put π 1 (x) = x1 . For any diffeomorphism µ of Rm we define µ1 : RN → m R by µ1 = µ ◦ π 1
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
229
PROPOSITION 15
Consider the linear system in Brunovský form 1. For any diffeomorphism µ of Rm , the map µ1 LAx µ1 λµ = .. . 1 Ln−1 µ Ax is a symmetry of . 2. Conversely, if σ is a symmetry of , then σ = λµ for some diffeomorphism µ of Rm . Note that µ1 is a map from RN into Rm depending on the variables x1 only. The transformation λµ : RN → RN is defined by successively differentiating this map with respect to the drift Ax. Item (1) claims that such a transformation is always a symmetry of the linear system (in particular, a diffeomorphism) while item (2) claims that all symmetries of linear systems are always of this form. REMARK 3
Clearly, an analogous result holds for local symmetries, that is, if µ is a local diffeomorphism of Rm , then the corresponding λµ is a local symmetry of
and, conversely, any local symmetry of is of the form λµ for some local diffeomorphism µ. This local version of the earlier result will allow us to describe below all local symmetries of feedback linearizable systems. Consider a control-affine system of the form : ξ˙ = f (ξ ) +
m
gi (ξ )ui
i=1
where ξ ∈ , an N-dimensional manifold, and f and gi for 1 ≤ i ≤ m are C∞ vector fields on . We will say that is feedback equivalent (or feedback linearizable) to a linear system of the form
: x˙ = Ax + Bv
0882-Perruquetti-ch04_R2_180805
230
Feedback Equivalence of Nonlinear Control Systems
if there exists a feedback transformation of the form
:
x = (ξ ) u = α(ξ ) + β(ξ )v
with β(ξ ) invertible, transforming into , compare Section 4.9. We say that is locally feedback linearizable at ξ0 if is a local diffeomorphism at ξ0 and α and β are defined locally around ξ0 . Define the following distributions: D1 = span {g1 , . . . , gm } and Dj+1 = Dj + [ f , Dj ]. The system is, locally at ξ0 , feedback equivalent to a linear system , see Section 4.9, with all controllability indices equal to n, if and only if the distributions Dj are involutive and of constant rank jm for 1 ≤ j ≤ n. For any map ϕ : 0 → Rm , where 0 is a neighborhood of ξ0 , put
ϕ
Lf ϕ ϕ = .. . Ln−1 ϕ f Note that ϕ is a map from 0 in RN . If the map ϕ = (ϕ1 , . . . , ϕm ) is chosen such that (Dn−1 )⊥ = span {dϕ} = span {dϕ1 , . . . , dϕm } then it is well known [38, 66] that ϕ is a local diffeomorphism of an open neighborhood ϕ of ξ0 onto Xϕ = ϕ (ϕ ), an open neighborhood of x0 = ϕ (ξ0 ), and gives local linearizing coordinates for in ϕ . To keep the notation coherent, we will denote by ξ , with various indices, points of ϕ , by x, with various indices, points of Xϕ = ϕ (ϕ ) ⊂ RN , and by y, with various indices, points of π 1 (Xϕ ) ⊂ Rm , where π 1 is the projection π 1 (x) = x1 . Combining this result with Proposition 15, we get the following complete description of local symmetries of feedback linearizable systems with equal controllability indices. The notation Diff(Rm ; y0 , y˜ 0 ) will stand for the family of all local diffeomorphisms of Rm at y0 transforming y0 into y˜ 0
0882-Perruquetti-ch04_R2_180805
4.11
Symmetries of Control Systems
231
(more precisely, all diffeomorphisms germs with the base point y0 and its image y˜ 0 ). THEOREM 26
Let the system be locally feedback linearizable at ξ0 with equal controllability indices. Fix ϕ : 0 → Rm such that (Dn−1 )⊥ = span {dϕ} = span {dϕ1 , . . . , dϕm }: 1. Let µ ∈ Diff(Rm ; y0 , y˜ 0 ), where y0 = π 1 (x0 ) and y˜ 0 = π 1 (λµ (x0 )), such that λµ (x0 ) ∈ Xϕ . Then σµ,ϕ = −1 ϕ ◦ λµ ◦ ϕ is a local symmetry of at ξ0 . 2. Conversely, if σ is a local symmetry of at ξ0 , such that σ (ξ0 ) ∈ ϕ , then there exists µ ∈ Diff(Rm ; y0 , y˜ 0 ), where y0 = π 1 (x0 ), y˜ 0 = π 1 (˜x0 ), x˜ 0 = ϕ (σ (ξ0 )) such that σ = σµ,ϕ −1 Moreover, σµ,ϕ = −1 ϕ ◦ λµ ◦ ϕ = ϕ ◦ µ◦ϕ .
The structure of symmetries of feedback linearizable systems is thus summarized by the following diagram.
Item (1) states that composing a linearizing transformation ϕ with a symmetry λµ of the linear equivalent of and with the inverse −1 ϕ we get a symmetry of , provided that the image x˜ 0 = λµ (x0 ) belongs to Xϕ (otherwise the composition is not defined). Item (2) asserts that any local symmetry of a feedback linearizable system is of this form. Moreover, any local symmetry can be expressed as a composition of one linearizing transformation with the inverse of another linearizing transformation. Indeed, observe that for any fixed ϕ, the map µ◦ϕ , for µ ∈ Diff(Rm ; y0 , y˜ 0 ), gives a linearizing diffeomorphism, and taking all µ ∈ Diff(Rm ; y0 , y˜ 0 )
0882-Perruquetti-ch04_R2_180805
232
Feedback Equivalence of Nonlinear Control Systems
for all y˜ 0 ∈ π 1 (Xϕ ), the corresponding maps µ◦ϕ provide all linearizing transformations around ξ0 . It follows from item (2) that the group of symmetries of feedback linearizable systems is infinite dimensional and parameterized by m functions of m variables. It is interesting to observe that just one nonlinearity, which is not removable by feedback, destroys this infinite dimensional group leaving, at most, two one-parameter families of symmetries (compare Theorem 24).
4.12
Feedforward and Strict Feedforward Forms
In this section, we study the problem of transforming a single-input nonlinear control system to feedforward form and strict feedforward form via a static state feedback. We provide checkable necessary and sufficient conditions (which involve the homogeneous m-invariants defined in Section 4.3) to bring the homogeneous terms of any fixed degree of the system into homogeneous feedforward form. If those conditions are satisfied, this leads to a constructive procedure which transforms the system, step by step, into feedforward or strict feedforward form. We illustrate our solution by analyzing the four-dimensional case. In particular, we compute the codimension of four-dimensional systems that are feedback equivalent to the feedforward form and strict feedforward form. This section is organized as follows. In Section 4.12.1, we will define the class of feedforward and strict feedforward systems, in both general and control-affine cases. We will also fix some notations used throughout the whole section. In Section 4.12.2, we will introduce feedforward and strict feedforward normal forms. Then we will present a step-by-step method transforming a given system to the feedforward or strict feedforward form (whenever it is possible): in Section 4.12.3 for the first nonlinearizable term and in Section 4.12.4 for terms of an arbitrary degree. We will illustrate our approach by analyzing feedforward and strict feedforward systems on R4 in Section 4.12.5. Finally, we will discuss the geometry of feedforward and strict feedforward systems in Section 4.12.6 and their symmetries in Section 4.12.7.
4.12.1
Introduction and Notations
Consider a single-input nonlinear control system of the form : ξ˙ = F(ξ , u)
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
233
where ξ ∈ Rn and u ∈ R. We say that the system is in feedforward form (resp. in strict feedforward form) if we have ξ˙1 = F1 (ξ1 , . . . , ξn , u)
ξ˙1 = F1 (ξ2 , . . . , ξn , u)
ξ˙2 = F2 (ξ2 , . . . , ξn , u)
ξ˙2 = F2 (ξ3 , . . . , ξn , u)
.. . ξ˙n−1 = Fn−1 (ξn−1 , ξn , u) ξ˙n = Fn (ξn , u)
resp.
.. .
.
ξ˙n−1 = Fn−1 (ξn , u) ξ˙n = Fn (u)
One of the most appealing features of the system in (strict) feedforward form is that we can construct a stabilizing feedback for them. This important result goes back to Teel [90] and has been followed by a growing literature on stabilization and tracking for systems in (strict) feedforward form [5, 39, 64, 65, 76, 91]. Feedforward systems can be viewed as duals of feedback linearizable systems. To see this, recall that in the single-input case, the class of feedback linearizable systems coincides with that of flat systems. Single-input flat systems are defined as systems for which we can find a function of the state that, together with its derivatives, gives all the states and the control of the system [19, 20, 41, 68]. In a dual way, for systems in strict feedforward form, we can find all states via a successive integration starting from a function of the control. Indeed, knowing u(t), we integrate Fn (u(t)) to get ξn (t); then we integrate Fn−1 (ξn (t), u(t)) to get ξn−1 (t); we continue doing this, and finally we integrate F1 (ξ2 (t), . . . , ξn (t), u(t)) to get ξ1 (t). For feedforward systems, solutions can be found by solving scalar differential equations: for each component we have to solve one scalar differential equation. It is therefore natural to ask which systems are equivalent to one of the just defined feedforward forms. In Ref. [63], the problem of transforming a system, linear with respect to controls, into (strict) feedforward form via a diffeomorphism (i.e., via a nonlinear change of coordinates), was studied. A geometric description of systems transformable into feedforward form, either via a diffeomorphism or via feedback, has been given elsewhere [4]. Similar conditions for the strict feedforward form have recently been proposed by the authors [74], where relations between strict feedforward systems and the notion of symmetries (as defined in Section 4.11) are studied, see Section 4.12.7. The conditions described in Refs. [4, 74] (which we recall in Section 4.12.6) are intrinsic and explain the geometry of the problem but in most cases are not checkable. In Refs. [80, 82, 84], we proposed a constructive procedure which allows to verify, step by step, whether a given system is feedback equivalent to the feedforward or strict feedforward form and to bring it to that form whenever it is possible.
0882-Perruquetti-ch04_R2_180805
234
Feedback Equivalence of Nonlinear Control Systems
Our solutions were inspired by and are based on a formal approach to the feedback equivalence problem described in Section 4.3 and thus constitute a good example of the strength of the formal approach. We will be dealing with control-affine systems of the form : ξ˙ = f (ξ ) + g(ξ )u where ξ ∈ Rn and u ∈ R. As usual, we assume that f (0) = 0 and g(0) = 0. A specification of the general definition to the control-affine case implies that is in feedforward form, or that it is a feedforward system, if we have
f1 (ξ1 , . . . , ξn )
f2 (ξ2 , . . . , ξn ) . .. f (ξ ) = f (ξ , ξ ) n−1 n−1 n
g1 (ξ1 , . . . , ξn )
g2 (ξ2 , . . . , ξn ) . .. and g(ξ ) = g (ξ , ξ ) n−1 n−1 n
fn (ξn )
gn (ξn )
Similarly, is in strict feedforward form (equivalently, it is a strict feedforward system), if we have f1 (ξ2 , . . . , ξn ) f2 (ξ3 , . . . , ξn ) .. f (ξ ) = . f (ξ ) n−1 n
g1 (ξ2 , . . . , ξn ) g2 (ξ3 , . . . , ξn ) .. and g(ξ ) = . g (ξ ) n−1 n
fn
gn
where the components fn and gn are constant and satisfy fn = 0 (because 0 is assumed to be an equilibrium) and gn = 0. To present our step-by-step approach, together with the system : ξ˙ = f (ξ ) + g(ξ )u we will consider its infinite Taylor series expansion ∞ : ξ˙ = Fξ + Gu +
∞ m=2
where F = (∂f /∂ξ )(0) and G = g(0).
( f [m] (ξ ) + g[m−1] (ξ )u)
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
235
Consider the infinite Taylor series expansion ∞ of the feedback transformation given by
x = φ(ξ ) = Tξ + ∞ :
∞
φ [m] (ξ )
m=2
u = α(ξ ) + β(ξ )v = Kξ + Lv +
∞
α [m] (ξ ) + β [m−1] (ξ )v
m=2
where T is an invertible matrix and L = 0. We will try (whenever possible) to bring the system ∞ into the (strict) feedforward form step by step by analyzing the action of ∞ . Notations. We will use normal forms and transformations which have been already defined in the paper but we will also introduce normal forms specific for this section. The symbols [m] , [≤m] , and ∞ will stand for the systems under consideration: homogenous, polynomial, and formal, respectively. Their state vector will be denoted by ξ and their control by u. The system [m] (resp. [≤m] and ∞ ) transformed via a feedback trans˜ [m] (resp. ˜ [≤m] and formation m (resp. ≤m and ∞ ) will be denoted by ∞ ˜ ). Its state vector will be denoted by x, its control by v, and the vector fields, defining its dynamics, by f˜ [m] and g˜ [m−1] . Feedback equivalence of ˜ [m] and of systems [≤m] and ˜ [≤m] will be established systems [m] and via a smooth feedback, through a homogeneous feedback m in the former case and through a polynomial feedback ≤m in the latter. On the other ˜ ∞ will be established via hand, feedback equivalence of systems ∞ and ∞ a formal feedback . We will use three kinds of normal forms for systems: Kang normal forms, feedforward normal forms, and strict feedforward normal forms. The symbol “bar” will correspond to the vector field f¯ [m] defining Kang normal [m] [≤m] ∞ . The symbol “hat” will correspond to the vec, NF , and NF forms NF [m] [≤m] ∞ tor field fˆ [m] defining feedforward normal forms FNF , FNF , and FNF [m] [≤m] ∞ and strict feedforward normal forms SFNF , SFNF , and SFNF . Analogously, the m-invariants of the system [m] will be denoted by a[m]j,i+2 , [m] by a¯ [m]j,i+2 , and the m-invariants of the the m-invariants of the system NF [m] [m] [m]j,i+2 systems FNF or SFNF by aˆ .
4.12.2
Feedforward and Strict Feedforward Normal Forms
We assume throughout this section that the linear part (F, G) of the system ∞ , given by (4.66), is controllable, and thus we can assume, without loss
0882-Perruquetti-ch04_R2_180805
236
Feedback Equivalence of Nonlinear Control Systems
of generality, that the system is in the form ∞
∞ : ξ˙ = Aξ + Bu +
f [m] (ξ ) + g[m−1] (ξ )u
(4.66)
m=2
where (A, B) is in the Brunovský canonical form. Recall from Section 4.3, that (as proved by Kang [50], compare also Ref. [83]) any nonlinear system of the form (4.66) can be put, via a formal feedback transformation ∞ , to the following Kang normal form: ∞ NF : x˙ = Ax + Bv +
∞
f¯ [m] (x)
m=2
where for any m ≥ 2, 2 [m−2] (x , . . . , x ) n 1 i i=j+2 xi Pj,i ¯f [m] (x) = j 0
if 1 ≤ j ≤ n − 2 if n − 1 ≤ j ≤ n
(4.67)
It is natural to ask whether it is possible to bring a system that is feedback equivalent to feedforward form (resp. strict feedforward form) to the Kang normal form (4.67) which would be simultaneously feedforward (resp. strict feedforward), that is, which would satisfy [m−2] [m−2] (x) = Pj,i (xj , . . . , xi ) Pj,i
[m−2] [m−2] resp. Pj,i (x) = Pj,i (xj+1 , . . . , xi )
Although, this is always possible for the first nonlinearizable term (see Theorem 28), the answer to the question is, in general, negative. For this reason we will introduce the following notions. DEFINITION 3
Strict feedforward normal form is the system ∞ SFNF : x˙ = Ax + Bv +
∞
fˆ [m] (x)
m=2
such that for any m ≥ 2, n m 2 [m−2] (x j+1 , . . . , xi ) 1 ≤ j ≤ n − 2 ˆf [m] (x) = cm,j xj+1 + i=j+2 xi Pj,i j 0 n−1≤j ≤n [m−2] are homogeneous polynomials of degree m − 2, where cm,j ∈ R and Pj,i depending on the indicated variables.
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
237
In the feedforward case we introduce similarly: DEFINITION 4
Feedforward normal form is the system ∞ FNF : x˙ = Ax + Bv +
∞
fˆ [m] (x)
m=2
such that for any m ≥ 2, [m−1] [m−2] (xj , xj+1 ) + ni=j+2 xi2 Pj,i (xj , . . . , xi ) 1 ≤ j ≤ n − 2 ˆf [m] (x) = xj kj j 0 n−1≤j ≤n [m−2] are homogeneous polynomials, of degree m − 1 where kj[m−1] and Pj,i and m − 2, respectively, depending on the indicated variables.
Usefulness of feedforward and strict feedforward normal forms is justified by the following theorem. THEOREM 27
The system ∞ , given by (4.66), is feedback equivalent to the feedforward form (resp. strict feedforward form) if and only if it is feedback equivalent to the ∞ (resp. strict feedforward normal form ∞ ). feedforward normal form FNF SFNF 4.12.3
Feedforward and Strict Feedforward Form: First Nonlinearizable Term
Consider the system ∞ , given by (4.66). Our goal is to study, whether it is possible to bring ∞ to the feedforward (resp. strict feedforward form) and, if possible, to do it step by step. Assume that ∞ is feedback linearizable up to order m0 − 1. As proved by Krener [56], m0 is the largest integer such that all distributions g Dk = span g, adf g, . . . , adk−1 f for 1 ≤ k ≤ n − 1, are involutive modulo terms of order m0 − 2. Since ∞ is feedback linearizable up to order m0 − 1, it is also feedback equivalent to the strict feedforward (in particular, to the feedforward) form up to the same order, and we can thus assume without loss of generality that the system ∞ is in feedforward (resp. strict feedforward) normal form up to order m0 − 1 (see Theorem 27), that is, it takes the form [≤m0 ] : ξ˙ = Aξ + Bu +
m 0 −1 m=2
h[m] (ξ ) + f [m0 ] (ξ ) + g[m0 −1] (ξ )u
(4.68)
0882-Perruquetti-ch04_R2_180805
238
Feedback Equivalence of Nonlinear Control Systems
modulo terms in V ≥m0 +1 (ξ , u), where for any 2 ≤ m ≤ m0 − 1 we have hj[m] (ξ ) =
ξj k [m−1] (ξj , ξj+1 )
if 1 ≤ j ≤ n − 2
0
if n − 1 ≤ j ≤ n
j
resp.
hj[m] (ξ )
=
m cm,j ξj+1
if 1 ≤ j ≤ n − 2
0
if n − 1 ≤ j ≤ n
(4.69)
(4.70)
Let us denote by a[m0 ]j,i+2 the m0 -invariants associated to the homogeneous part of degree m0 of the system (4.68) and (4.69) or (4.68)–(4.70). Recall that = {(j, i) ∈ N × N : 1 ≤ j ≤ n − 2, 0 ≤ i ≤ n − j − 2} We have the following result concerning the first nonlinearizable term: THEOREM 28
Consider the system [≤m0 ] , given by (4.68): 1. There exists a transformation ≤m0 bringing the system (4.68) into the feedforward form, up to order m0 if and only if LAn−q B a[m0 ]j,i+2 = 0
(4.71)
for any (j, i) ∈ and any 1 ≤ q ≤ j − 1. 2. There exists a transformation ≤m0 bringing the system (4.68) into the strict feedforward form, up to order m0 if and only if LAn−q B a[m0 ]j,i+2 = 0
(4.72)
for any (j, i) ∈ and any 1 ≤ q ≤ j. COROLLARY 9
If there exists a transformation ∞ bringing the system ∞ : ξ˙ = Aξ + Bu +
∞
f [m] (ξ ) + g[m−1] (ξ )u
m=m0
to feedforward form (resp. strict feedforward form), then the condition (4.71) (resp. (4.72)) is satisfied for any (j, i) ∈ and any 1 ≤ q ≤ j − 1 (resp. 1 ≤ q ≤ j).
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
239
In other words, the aforementioned result says that if a system is feedback equivalent to the feedforward form (resp. strict feedforward form), then, after having linearized lower order terms, the first nonlinearizable term must be feedforward (resp. strict feedforward) when transformed to the Kang normal form. This is the case if and only if the condition (4.71) (resp. (4.72)) is satisfied. If m0 = 2, then the 2-invariants a[2]j,i+2 are constant and the conditions (4.71) and (4.72) are automatically satisfied, which implies that any system is equivalent to the strict feedforward form (in particular, to the feedforward form) up to order 2. Actually, in this case, the Kang–Krener [2] normal form NF (recalled just following Theorem 3) is strict feedforward and can serve as a strict feedforward normal form (we do not have to add the vector field h[2] ). COROLLARY 10 (Kang–Krener)
If m0 = 2 then the system (4.68) is always equivalent to the strict feedforward form (in particular, to the feedforward form) up to order 2.
4.12.4
Feedforward and Strict Feedforward Forms: The General Step
According to Theorem 28, the Kang normal form of the first nonlinearizable term of a system, which is feedback equivalent to feedforward (resp. strict feedforward form), must be feedforward (resp. strict feedforward). We will see in the following text, that the situation gets different when we proceed to higher-order terms. Let us assume that the system ∞ , given by (4.66), is in feedforward (resp. strict feedforward) normal form up to order m0 + l − 1, that is, ∞ takes the form
∞
: ξ˙ = Aξ + Bu +
m0 +l−1
h[m] (ξ )
m=2
+
m0 +l−1
f¯ [m] (ξ ) + f [m0 +l] (ξ ) + g[m0 +l−1] (ξ )u + R(ξ , u)
(4.73)
m=m0
where R(ξ , u) ∈ V ≥m0 +l+1 (ξ , u) and for any m0 ≤ m ≤ m0 + l − 1, 2 [m−2] (ξ , . . . , ξ ) if 1 ≤ j ≤ n − 2 n j i i=j+2 ξi Pj,i [m] ¯f (ξ ) = j 0 if n − 1 ≤ j ≤ n and hj[m] (ξ ) =
ξj k [m−1] (ξj , ξj+1 )
if 1 ≤ j ≤ n − 2
0
if n − 1 ≤ j ≤ n
j
(4.74)
(4.75)
0882-Perruquetti-ch04_R2_180805
240
Feedback Equivalence of Nonlinear Control Systems resp. h[m] (ξ ) = j
cm,j ξ m
if 1 ≤ j ≤ n − 2
0
if n − 1 ≤ j ≤ n
j+1
(4.76)
From the definition of m0 , it follows that there exists 1 ≤ j ≤ n − 2 such [m ] [m ] that f¯j 0 = 0. Throughout we will assume that f¯n−20 = 0, which simplifies the exposition. The analysis of the general case, although more technical, follows the same line (see Ref. [80] for the strict feedforward form). [m +l]j,i+2 , Crucial objects in studying the strict feedforward case are ak,00 which are the homogeneous invariants associated to the homogeneous system [m +l] k,00 : ξ˙ = Aξ + Bu + f¯ [m0 ] , Yk[l+1] (ξ ) where [l+1] = ξkl+1 Yk[l+1] = Yk,0
∂ ∂ ∂ + LAξ ξkl+1 + · · · + Ln−k ξkl+1 Aξ ∂ξk ∂ξk+1 ∂ξn
For any 2 ≤ k ≤ n − 2 and any 0 ≤ s ≤ l + 1, consider the homogeneous vector fields ∂ ∂ [l+1] s s = ξk−1 ξkl+1−s + LAξ ξk−1 ξkl+1−s Yk,s ∂ξk ∂ξk+1 ∂ s ξk−1 + · · · + Ln−k−1 ξkl+1−s Aξ ∂ξn In studying the feedforward case, crucial objets are a[m0 +l]j,i+2 , which are the (m0 + l)-invariants of the homogeneous system [m0 +l] , defined by (4.73)– [m +l]j,i+2
(4.75), and ak,s0
, the (m0 + l)-invariants of the homogeneous system [m +l] [l+1] (ξ ) k,s 0 : ξ˙ = Aξ + Bu + f¯ [m0 ] , Yk,s
Our two main results of this section can be stated as follows. In the strict feedforward case we have (see [80, 84] for the proof). THEOREM 29
The system ∞ , defined by (4.73), (4.74), (4.76), is feedback equivalent to the strict feedforward form, up to order m0 + l, if and only if there exist real constants σ2,0 , σ3,0 , . . . , σn−2,0 such that for any (j, i) ∈ and any 1 ≤ q ≤ j n−2 [m0 +l]j,i+2 [m0 +l]j,i+2 LAn−q B a =0 (4.77) − σk,0 ak,0 k=2
In the feedforward case we have (see [82] for the proof and comments).
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
241
THEOREM 30
The system ∞ , defined by (4.73–4.75), is feedback equivalent, up to order m0 + l, to the feedforward form if and only if there exist real constants σk,s for 2 ≤ k ≤ n − 2 and 1 ≤ s ≤ l + 1 such that for any (j, i) ∈ and any 1 ≤ q ≤ j − 1 LAn−q B a[m0 +l]j,i+2 −
l+1 n−2
[m +l]j,i+2 σk,s ak,s0
=0
(4.78)
k=2 s=1
Notice that (4.77) is an invariant way of expressing the fact that [m0 +l]j,i+2
a
−
n−2
[m +l]j,i+2
σk,0 ak,00
[m +l−2]
= Qj,i 0
k=2 [m +l−2]
[m +l−2]
where Qj,i 0 = Qj,i 0 (ξj+1 , . . . , ξi ) are homogeneous polynomials of degree m0 + l − 2 depending on the indicated variables only. Similarly, (4.78) is an invariant way of expressing the fact that a[m0 +l]j,i+2 −
l+1 n−2
[m +l]j,i+2
σk,s ak,s0
[m +l−2]
= Qj,i 0
k=2 s=1 [m +l−2]
[m +l−2]
where Qj,i 0 = Qj,i 0 (ξj , . . . , ξi ) are homogeneous polynomials of degree m0 + l − 2 depending on the indicated variables only. Observe that checking the conditions (4.72) and (4.77) or the conditions (4.71) and (4.78) involves only differentiation of polynomials and algebraic operations. Therefore Theorem 28 (1) followed by a successive application of Theorem 30 (resp. Theorem 28 (2) followed by a successive application of Theorem 29) yields to a constructive procedure that allows us to check whether a given system can be transformed into feedforward (resp. strict feedforward) form. Moreover, for any system satisfying the conditions (4.71) and (4.78) (resp. (4.72) and (4.77)), we can calculate, step by step, the explicit feedback transformations bringing it into feedforward (resp. strict feedforward) form using transformations constructed in Refs. [79, 83] and presented in Section 4.3. Finally, observe that the condition (4.78) can be seen as a natural generalization of (4.77). Indeed, in the second sum of (4.78) we could start the [l+1] summation with s = 0. It is so, because the action of Yk,0 on all compo[l+1] nents, starting from the second one, can be compensated by that of Yk,s ,
[l+1] for s ≥ 1, and the action of Yk,0 on the first component is irrelevant since the first component can be arbitrary in any feedforward system.
0882-Perruquetti-ch04_R2_180805
242 4.12.5
Feedback Equivalence of Nonlinear Control Systems Feedforward and Strict Feedforward Systems on R4
The aim of this subsection is to illustrate our results by comparing feedforward and strict feedforward systems in R4 . Notice that this is the lowest dimension in which both classes are nontrivial since in R3 all systems with controllable linearization can be brought to the feedforward form via feedback. 4.12.5.1
Feedforward Case
Consider a system on R4 and assume that it is feedback equivalent to the feedforward form up to terms of degree m. Then, according to Theorem 27, we can assume, without loss of generality, that the system takes the form ξ˙1 = ξ2 +
m
fˆ1[k] (ξ ) + f¯1[m+1] (ξ )
k=2
ξ˙2 = ξ3 +
m
fˆ2[k] (ξ ) + f¯2[m+1] (ξ )
(4.79)
k=2
ξ˙3 = ξ4 ξ˙4 = u where the homogeneous vector fields fˆ1[k] (∂/∂ξ1 ) + fˆ2[k] (∂/∂ξ2 ), for 2 ≤ k ≤ m, are in feedforward normal form (see Definition 4) and ∂ ∂ f¯ [m+1] = f¯1[m+1] + f¯2[m+1] ∂ξ1 ∂ξ2 ∂ [m−1] [m−1] = ξ32 P1,3 (ξ1 , ξ2 , ξ3 ) + ξ42 P1,4 (ξ1 , ξ2 , ξ3 , ξ4 ) ∂ξ1 ∂ [m−1] + ξ42 P2,4 (ξ1 , ξ2 , ξ3 , ξ4 ) ∂ξ2 is in the Kang normal form [m+1] . Let us consider, for any 1 ≤ s ≤ m, the following homogeneous vector field [m] Y2,s = ξ1s ξ2m−s
∂ ∂ ∂ + LAξ ξ1s ξ2m−s + L2Aξ ξ1s ξ2m−s ∂ξ2 ∂ξ3 ∂ξ4
and construct the corresponding homogeneous system [m+1] ˙ [m] 2,s : ξ = Aξ + Bu + f¯ [2] , Y2,s (ξ )
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
243
where the Kang–Krener quadratic normal form f¯ [2] is given by ∂ ∂ + cξ42 f¯ [2] = aξ32 + bξ42 ∂ξ1 ∂ξ2 [m+1]j,i+2
Let us denote by a2,s
and a[m+1]j,i+2 , for (j, i) ∈ , the homogeneous
[m+1] and invariants associated, respectively, to the homogeneous system 2,s to the normal form [m+1] ˙ : ξ = Aξ + Bu + f¯ [m+1] (ξ ) NF
Here (A, B) is the Brunovský canonical form of dimension 4. Denote C2 = (0, 1, 0, 0). We have = {(1, 0); (1, 1); (2, 0)}. Since the only term that is not [m−1] depends on ξ1 , we will focus our attention feedforward is present if P2,4 only on the invariants a[m+1]2,2 and a[m+1]2,2 given, respectively, by 2,s [m] = C2 ad2B f¯ [2] , Y2,s a[m+1]2,2 2,s
and a[m+1]2,2 = C2 ad2B f¯ [m+1] =
[m−1] ∂ 2 ξ42 P2,4
∂ξ42
A direct computation gives a[m+1]2,2 = 2bsξ1s−1 ξ2m−s − 2c(m − s)ξ1s ξ2m−s−1 2,s Then the system (4.79) is feedback equivalent to the feedforward form up to order m + 1 if and only if there exist real constants σ2,s , for 1 ≤ s ≤ m − 1, such that m a[m+1]2,2 − σ2,s a[m+1]2,2 = Q[m−1] (ξ2 , ξ3 , ξ4 ) 2,s s=1
for some homogeneous polynomial Q[m−1] (ξ2 , ξ3 , ξ4 ), which is equivalent to the condition that [m−1] (ξ ) = S[m−1] (ξ1 , ξ2 ) + S[m−1] (ξ2 , ξ3 , ξ4 ) P2,4 1 2
The codimension cFF (m + 1) of the space of homogeneous systems of degree m + 1, which are feedback equivalent to feedforward form, is equal to the dimension of the space of all homogeneous polynomials of degree m − 1 of the form (ξ ) = ξ1 ξ3 R1[m−3] (ξ1 , ξ2 , ξ3 ) + ξ1 ξ4 R2[m−3] (ξ1 , ξ2 , ξ3 , ξ4 ) Q[m−1] 2 We thus get cFF (m + 1) =
(m − 1)(m − 2) (m − 2)(m − 1)m (m + 3)(m − 1)(m − 2) + = 2 6 6
0882-Perruquetti-ch04_R2_180805
244
Feedback Equivalence of Nonlinear Control Systems
4.12.5.2 Strict Feedforward Case Now, consider a system on R4 and assume that it is feedback equivalent to a strict feedforward form up to terms of degree m. Then, according to Theorem 27, we can assume, without loss of generality, that the system takes the form (4.79), where the homogeneous vector fields fˆ1[k] (∂/∂ξ1 ) + fˆ2[k] (∂/∂ξ2 ), for 2 ≤ k ≤ m, are in strict feedforward normal form (see Definition 3) and f¯ [m+1] in Kang normal form. We assume m0 = 2 which yields l = m − 1, and we consider the vector field ∂ ∂ ∂ + LAξ ξ2m + L2Aξ ξ2m ∂ξ2 ∂ξ3 ∂ξ4 ∂ ∂ ∂ = ξ2m + mξ2m−1 ξ3 + m(m − 1)ξ2m−2 ξ32 + mξ2m−1 ξ4 ∂ξ2 ∂ξ3 ∂ξ4
[m] Y2,0 = ξ2m
whose corresponding homogeneous system is [m+1] ˙ [m] 2,0 : ξ = Aξ + Bu + f¯ [2] , Y2,0 [m+1]j,i+2
Denote by a2,0 and a¯ [m+1]j,i+2 , for (j, i) ∈ = {(1, 0); (1, 1); (2, 0)}, the homogeneous invariants associated, respectively, to the homogeneous [m+1] systems 2,0 and to the normal form [m+1] ˙ NF : ξ = Aξ + Bu + f¯ [m+1] (ξ )
Denote C1 = (1, 0, 0, 0) and C2 = (0, 1, 0, 0). We will calculate the invariants [m+1] a[m+1]1,2 , a[m+1]2,2 , and a[m+1]1,3 of system 2,0 . We have 2,0 2,0 2,0 [m] 2 ¯ [2] a[m+1]1,2 = C ad , Y f 1 B 2,0 , 2,0 and
[m] 2 ¯ [2] a[m+1]2,2 = C ad , Y f 2 B 2,0 2,0
[m] [m] a[m+1]1,3 ad (π3 (ξ )) = C X − ad X 2 1 AB A B 2,0 2 1
[m] where π3 (ξ ) = (ξ1 , ξ2 , ξ3 )T , X1[m] = adB [ f¯ [2] , Y2,0 ], and X2[m] = adAB [ f¯ [2] , [m] [m] ] − adAξ adB [ f¯ [2] , Y2,0 ]. Y2,0 A direct computation gives
a[m+1]1,2 = a[m+1]2,2 = −2cmξ2m−1 2,0 2,0 and a[m+1]1,3 = −4amξ2m−1 + 8bm(m − 1)(m − 2)ξ2m−3 ξ32 − 4cm(m − 1)ξ2m−2 ξ3 2,0
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
245
On the other hand, the invariants associated to the normal form are a¯ [m+1]1,2 = ad2B f¯1[m+1] =
[m−1] ∂ 2 ξ42 P1,4
∂ξ42
a¯ [m+1]1,3 = ad2AB f¯1[m+1] (π3 (ξ )) =
[m−1] ∂ 2 ξ32 P1,3
∂ξ32
(π3 (ξ ))
and a¯ [m+1]2,2 = ad2B f¯2[m+1] =
[m−1] ∂ 2 ξ42 P2,4
∂ξ42
Then the system (4.79) is feedback equivalent to a strict feedforward form up to order m + 1 if and only if there exist a real constants σ2,0 such that = Q[m−1] (ξ2 , ξ3 , ξ4 ) a¯ [m+1]1,2 − σ2,0 a[m+1]1,2 2,0 1,4 = Q[m−1] (ξ2 , ξ3 ) a¯ [m+1]1,3 − σ2,0 a[m+1]1,3 2,0 1,3 and a¯ [m+1]2,2 − σ2,0 a[m+1]2,2 = Q[m−1] (ξ3 , ξ4 ) 2,0 2,4 for some homogeneous polynomials Q[m−1] (ξ2 , ξ3 , ξ4 ), Q[m−1] (ξ2 , ξ3 ), and 1,4 1,3
(ξ3 , ξ4 ). These conditions are equivalent to the fact that Q[m−1] 2,4 [m−1] P1,4 (ξ ) = S[m−1] (ξ2 , ξ3 , ξ4 ), 1,4
[m−1] P1,3 (ξ ) = S[m−1] (ξ2 , ξ3 ), 1,3
and
[m−1] P2,4 (ξ ) = λξ2m−1 + S[m−1] (ξ3 , ξ4 ) 2,4
The codimension cSFF (m + 1) of the space of homogeneous systems of degree m + 1, which are feedback equivalent to strict feedforward form, is equal to the dimension of the space of all homogeneous vector fields of degree m − 1 of the form
∂ ∂ξ1
[m−3] [m−2] ξ1 ξ32 R1,3 (ξ1 , ξ2 , ξ3 ) + ξ1 ξ42 R1,4 (ξ1 , ξ2 , ξ3 , ξ4 )
∂ [m−2] [m−2] + ξ42 ξ1 R2,4 (ξ1 , ξ2 , ξ3 , ξ4 ) + ξ2 R¯ 2,4 (ξ2 , ξ3 , ξ4 ) ∂ξ2 [m−2] with R¯ 2,4 (ξ2 , 0, 0) = 0, [m−3] ˆ (ξ2 , ξ3 , ξ4 ). ξ4 R 2,4
that
is,
[m−2] [m−3] R¯ 2,4 (ξ2 , 0, 0) = ξ3 R˜ 2,4 (ξ2 , ξ3 ) +
0882-Perruquetti-ch04_R2_180805
246
Feedback Equivalence of Nonlinear Control Systems
We thus get cSFF (m + 1) =
=
(m + 1)m(m − 1) m(m − 1) (m + 1)m(m − 1) + + 6 2 6 m − 2 (m − 1)(m − 2) + + 1 2 m3 + 3m2 − 4m − 3 3
REMARK 4
The codimensions cFF (m + 1) and cSFF (m + 1) are computed for generic systems, in particular in the case when f¯2[2] = 0. If f¯2[2] = 0, then those codimensions are modified as follows c˜ FF (m + 1) = cFF (m + 1) + 1 =
(m + 3)(m − 1)(m − 2) +1 6
c˜ SFF (m + 1) = cSFF (m + 1) + 1 =
m3 + 3m2 − 4m 3
In each case, the gap between the two codimensions is equal to (m3 + 6m2 − m − 12)/6. Finally, we will compute the codimension of the space of linearizable homogenous systems of degree m + 1 on R4 . The homogeneous part of degree m + 1 of (4.79) is given by two polynomials P1,4 and P2,4 of four variables and one polynomial P1,3 of three variables. Linearizability is equivalent to vanishing of all of them and thus the codimension of linearizable homogeneous systems is cFL(m + 1) =
4.12.6
(2m + 5)(m − 1)m (m − 1)m 2(m − 1)m(m + 1) + = 2 6 6
Geometric Characterization of Feedforward and Strict Feedforward Systems
In the previous subsection, we proposed a step-by-step constructive method to bring a system into a feedforward form and strict feedforward form whenever possible [80, 82, 84]. The problem of transforming a system, affine with respect to controls, into (strict) feedforward form via a diffeomorphism (i.e., via a nonlinear change of coordinates), was studied earlier [63]. A geometric description of systems in feedforward form has been given elsewhere [4]. These conditions, although being intrinsic, are not checkable. In the present section, we look at the problem in the spirit of Ref. [4] but we focus our attention on vector fields rather than on invariant
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
247
distributions. It turns out that feedback equivalence (resp. state-space equivalence) to the strict feedforward form can be characterized by the existence of a sequence of infinitesimal symmetries (resp. strong infinitesimal symmetries) of the system.
4.12.7
Symmetries and Strict Feedforward Form
In this section, we will establish results relating symmetries and strict feedforward forms. To start with, recall (see Introduction) two basic notions of equivalence of control systems. The word smooth will mean throughout C∞ -smooth and all control systems are assumed to be smooth. Two control systems : x˙ = f (x) + g(x)u,
x∈X
˜ : x˙˜ = f˜ (˜x) + g˜ (˜x)u, ˜
˜ x˜ ∈ X
and ˜ are called S-equivalent, if there exists a smooth diffeomorphism φ : X → X, such that φ∗ f = f˜ and φ∗ g = g˜ ˜ and they are called F-equivalent (feedback equivalent), if (we take u = u), ˜ and smooth functions α, there exists a smooth diffeomorphism φ : X → X β, satisfying β(·) = 0, such that φ∗ ( f + gα) = f˜
and φ∗ ( gβ) = g˜
Recall also (see Section 4.11.4) that a vector field v on an open subset X ⊂ Rn is an infinitesimal symmetry of the system if the (local) flow γtv of v is a local symmetry of , for any t for which it exists. We will also be dealing with the following stronger notions. A diffeomorphism φ : X −→ X is a strong symmetry of if it preserves the vector fields f and g (and not only the affine distribution A spanned by them), that is, if φ∗ f = f
and φ∗ g = g
A local strong symmetry is a local diffeomorphism preserving f and g. We say that a vector field v on an open subset X ⊂ Rn is an infinitesimal strong symmetry of the system if the (local) flow γtv of v is a local strong symmetry of , for any t for which it exists. Consider the system and denote by G the distribution spanned by the vector field g. We have the following characterization of infinitesimal symmetries and strong symmetries.
0882-Perruquetti-ch04_R2_180805
248
Feedback Equivalence of Nonlinear Control Systems
PROPOSITION 16
1. A vector field v is an infinitesimal strong symmetry of if and only if [v, g] = 0,
and [v, f ] = 0
2. A vector field v, such that v(p) = 0, is an infinitesimal symmetry of , locally at p, if and only if [v, g] = 0 mod G,
and [v, f ] = 0 mod G
in a neighborhood of p. The second item remains true even if g( p) = 0. In this case, we have to understand G as being the module of vector fields generated by g over the ring of smooth functions. An infinitesimal symmetry v is called stationary at p ∈ X if v(p) = 0 and nonstationary if v(p) = 0. Assume that v is a strong infinitesimal symmetry of , nonstationary at p ∈ X. Then there exist a neighborhood Xp of p and the factor system /∼v , where the equivalence relation ∼v is induced by the local action of the 1-parameter local group defined by v, that is, q1 ∼v q2 if and only if they belong to the same integral curve of v (more precisely, to the same connected component of the intersection of an integral curve of v with Xp ). THEOREM 31
The following condition are equivalent. 1. is, locally at p ∈ X, S-equivalent to the affine strict feedforward form. 2. Each system 1 , 2 , . . . , n possesses a strong infinitesimal nonstationary symmetry vi , where 1 is the restriction of to a neighborhood Xp and i+1 = i /∼vi with ∼vi the equivalence relation defined by the local action of the 1-parameter group of vi . 3. There exist smooth vector fields w1 , . . . , wn , independent at p ∈ X, such that, locally at p, [wi , wj ] ∈ Di−1 ,
[wi , g] ∈ Di−1 ,
[wi , f ] ∈ Di−1
for any 1 ≤ i ≤ n and j ≤ i, where D0 = 0 and Di = span {w1 , . . . , wi }. ˜ n , independent at p ∈ X, such that, ˜ 1, . . . , w 4. There exist smooth vector fields w locally at p, ˜ i, w ˜ j ] = 0, [w
˜ i , g] ∈ D˜ i−1 , [w
˜ i , f ] ∈ D˜ i−1 [w
˜ 1, . . . , w ˜ i }. for any 1 ≤ i ≤ n and j ≤ i, where D˜ 0 = 0 and D˜ i = span {w
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
249
In Section 4.12.8, we will show that the problem of transforming a general system to SFF can be reduced to Theorem 31 by a preintegration. A detailed proof of Theorem 31 is given elsewhere [73]. Theorem 31 implies that an invariant characterization of the affine strict feedforward form involves vector fields (forming a sequence of infinitesimal symmetries) rather than invariant distributions. To be more precise, a characterization of the affine feedforward form z˙ 1 = f1 (z1 , . . . , zn ) + g1 (z1 , . . . , zn )u z˙ 2 = f2 (z2 , . . . , zn ) + g2 (z2 , . . . , zn )u .. .
(AFF)
z˙ n−1 = fn−1 (zn−1 , zn ) + gn−1 (zn−1 , zn )u z˙ n = fn (zn ) + gn (zn )u was obtained by Astolfi and Mazenc [4] in terms of invariant distributions as given in the following proposition. PROPOSITION 17
The system is locally equivalent to the affine feedforward form if and only if there exists a sequence of distributions D 1 ⊂ · · · ⊂ Dn where Di is involutive and of rank i, such that [Di , g] ⊂ Di ,
[Di , f ] ⊂ Di
A first guess for a characterization of the affine strict feedforward form could be [4] the existence of a nested sequence of involutive distributions Di , of constant rank i, satisfying [Di , g] ⊂ Di−1 ,
[Di , f ] ⊂ Di−1
This is not a correct answer for two reasons. First, the latter conditions are not invariant, that is, even if they are satisfied for some vector fields w1 , . . . , wi spanning Di then, in general, for other generators of the same distribution Di , we will have on the right the inclusion in Di (and not in Di−1 ). Secondly, the aforementioned conditions, even reformulated in terms of vector fields, are not sufficient for equivalence to affine strict feedforward
0882-Perruquetti-ch04_R2_180805
250
Feedback Equivalence of Nonlinear Control Systems
form. Indeed, the condition that there exist linearly independent vector fields w1 , . . . , wn such that [wi , g] ∈ Di−1 ,
[wi , f ] ∈ Di−1
for any 1 ≤ i ≤ n, where D0 = 0 and Di = span {w1 , . . . , wi } are involutive, does not imply S-equivalence to the affine strict feedforward form unless we assume an additional property on the wi s: like the first condition of Theorem 31 (3) (which is the weakest possible) or the first condition of Theorem 31 (4), which is the strongest one. We have an analogous result for feedback equivalence to the strict feedforward form, where the role of strong infinitesimal symmetries is replaced by that of infinitesimal symmetries. To state this, we need the following considerations. We will write ( f , g), to denote the system defined by the pair of vector fields ( f , g). Assume that v is an infinitesimal symmetry of ( f , g), nonstationary at p ∈ X, that is, such that v(p) = 0. Then the second item of Proposition 16 implies that there exists a feedback pair (α, β) ˜ f˜ , g˜ ), where such that v is a strong infinitesimal symmetry of the system ( ˜f = f + gα and g˜ = gβ. Thus there exists a neighborhood Xp of p in which ˜ ∼v is well defined, where the equivalence relation ∼v the factor system / is induced by the local action of the 1-parameter local group defined by ˜ f˜ , g˜ ), feedback v. Notice that given a system , there are many systems ( ˜ equivalent to , and such that v is a strong infinitesimal symmetry of . ˜ any of those systems. Actually, any two such systems We will denote by ˜ where the functions α˜ and β˜ are are equivalent by a feedback pair (α, ˜ β), constant on the trajectories of v. THEOREM 32
The following condition are equivalent: 1. is, locally at p ∈ X, F-equivalent to the affine strict feedforward form satisfying gn = 0. 2. Each system 1 , 2 , . . . , n possesses an infinitesimal symmetry vi , where 1 is the restriction of to a neighborhood Xp and ˜ i /∼v i+1 = i where ∼vi is the equivalence relation induced by the local action of the 1parameter group of vi , and such that vi and the control vector field gi of i are independent, for 1 ≤ i ≤ n − 1. 3. There exist smooth vector fields w1 , . . . , wn , independent at p ∈ X, such that, locally at p, [wi , wj ] ∈ Di−1 ,
[wi , g] ∈ Di−1 + G,
[wi , f ] ∈ Di−1 + G
0882-Perruquetti-ch04_R2_180805
4.12
Feedforward and Strict Feedforward Forms
251
for any 1 ≤ i ≤ n and j ≤ i, where D0 = 0 and Di = span {w1 , . . . , wi } and, moreover, g(p) ∈ / Dn−1 (p). ˜ 1, . . . , w ˜ n , independent at p ∈ X, such that, 4. There exist smooth vector fields w locally at p, ˜ i, w ˜ j ] = 0, [w
˜ i , g] ∈ D˜ i−1 + G, [w
˜ i , f ] ∈ D˜ i−1 + G [w
˜ 1, . . . , w ˜ i} for any 1 ≤ i ≤ n and j ≤ i, where D˜ 0 = 0 and D˜ i = span {w ˜ and, moreover, g(p) ∈ / Dn−1 (p). The assumption g(p) ∈ / Dn−1 (p) can be dropped (equivalently, we allow for gn = 0) if we understand the conditions (3) and (4) as well as those of the second item of Proposition 16 in the sense of module of vector fields and not of distributions. A proof of Theorem 32 follows the same line as that of Theorem 31, the only difference is to show that in the successive steps, the existence of ˜ i in i+1 = infinitesimal symmetries does not depend on the choice of ˜ i /∼v . i 4.12.8
Strict Feedforward Form: Affine Versus General
In this section, we will show that the problem of transforming a general control system to the strict feedforward form can be reduced to that for affine systems by taking the preintegration. The same procedure of extension (compare Proposition 1) has been already used for the problems of linearization and decoupling [94] and equivalence to the p-normal form [71]. Consider a general nonlinear control system : x˙ = f (x, u) where x ∈ X, an open subset of Rn , u ∈ R. Together with , we consider its extension (preintegration) e : x˙ e = f e (xe ) + ge (xe )w where xe = (x, u) ∈ X × R1 , w ∈ R, and the dynamics are given by f e (xe ) = (f (x, u), 0)T and ge (xe ) = (∂/∂u). Notice that e is a control-affine system controlled by the derivative u˙ = w of the original control u. Recall that L0 denotes the Lie ideal generated by { fu − fu¯ }, u, u¯ ∈ U, in the Lie algebra L of the system . Assume that dim L0 (p) = n. PROPOSITION 18
The system is S-equivalent (resp. F-equivalent), locally at (x0 , u0 ), to the strict feedforward form if and only if the extension e is, locally at
0882-Perruquetti-ch04_R2_180805
252
Feedback Equivalence of Nonlinear Control Systems
x0e = (x0 , u0 ), S-equivalent (resp. F-equivalent) to the affine strict feedforward form. The proof is based on showing that a diffeomorphism bringing e into the affine strict feedforward form is of a special form: states depend on states only and the control is preserved. In particular, we show the following statement, which is of independent interest. COROLLARY 11
If the system is in an affine strict feedforward form satisfying gn = 0, then it is S-equivalent to another affine strict feedforward form, for which g1 = · · · = gn−1 = 0.
4.12.9
Strict Feedforward Systems on the Plane
In this section, we will describe strict feedforward systems on the plane. Consider a system on an open subset X of R2 and suppose that g(p) = 0. We define the multiplicity of at p as the smallest integer µ, such that g and µ adg f are linearly independent at p. Notice that the notion of multiplicity is feedback invariant [46]. If the multiplicity is µ = 1, then the system is feedback linearizable and thus feedback equivalent to the affine strict feedforward form. The case of multiplicity µ ≥ 2 is described by the following proposition. PROPOSITION 19
Consider a system on open subset X of R2 and suppose that g(p) = 0 and that it has multiplicity µ ≥ 2 at p. 1. If f and g are linearly dependent at p, then is locally F-equivalent to the strict feedforward form if and only f = γ adg f mod G where γ is a smooth function such that the smooth function ϕ defined by µ
f = ϕadg f mod G is divisible by γ µ . Moreover, in this case is locally F-equivalent to µ z˙ 1 = z2
z˙ 2 = v
0882-Perruquetti-ch04_R2_180805
4.13
Analytic Normal Forms: A Class of Strict Feedforward Systems
253
2. If f and g are linearly independent at p, then is locally F-equivalent to the strict feedforward form if and only adg f = γ ad2g f mod G where γ is a smooth function such that the smooth function ψ defined by µ
adg f = ψadg f mod G is divisible by γ µ−1 . Moreover in this case is locally F-equivalent to µ z˙ 1 = 1 + z2
z˙ 2 = v It has been proved earlier [46] that any planar system with a finite multiplicity µ at p is locally feedback equivalent to the following system around 0 ∈ R2 : µ µ−2 z˙ 1 = z2 + aµ−2 z2 + · · · + a1 z2 + a0
z˙ 2 = v where the smooth functions ai , for 0 ≤ i ≤ µ − 2, depend on z1 only and satisfy ai (0) = 0 (except for a0 in the case f and g independent at p). Moreover, we can always normalize one of the functions ai (in particular, we can take a0 = ±1 if a0 (0) = 0) and then the infinite jets of all remaining functions are feedback invariant. Proposition 19 implies that among all planar system only those are F-equivalent to the affine strict feedforward form for which all the above invariants are identically zero.
4.13
Analytic Normal Forms: A Class of Strict Feedforward Systems
In the previous sections, we have developed the theory of feedback classification following a formal approach introduced by Kang and Krener. Although the normal forms obtained are formal, the theory has proved to be very useful in analyzing structural properties of nonlinear control systems. It has been used to study bifurcations of nonlinear systems [52, 55], has led to a complete description of symmetries around equilibrium, presented in Section 4.11 [72, 73], and allowed to characterize systems equivalent to feedforward and strict feedforward forms (see Section 4.12) [80, 82, 84].
0882-Perruquetti-ch04_R2_180805
254
Feedback Equivalence of Nonlinear Control Systems
A natural question to ask is whether normal and canonical forms presented in earlier sections are convergent. It is already known that the problem of convergence is difficult even for dynamical systems whose convergence depend on the location of the eigenvalues of the linear part. Those eigenvalues stand to be invariants for dynamical systems which is a first difference with control systems because the notion of eigenvalues is meaningless. It has been proved (see [3, 12]) that a dynamical system is biholomorphically equivalent to its linear part if the spectrum of its linearization is not resonant and belongs either to the Poincaré domain or to the Siegel domain with type (C, ν). When the spectrum is resonant and belongs to the Poincaré domain, then the Poincaré–Dulac theorem shows that the dynamical system is biholomorphically equivalent to a polynomial vector field. We will not explicitly recall those results here because of space limitations and we refer the reader to the existing literature. For control systems, Kang [50] derived from Ref. [56], and Ref. [57] (see also [38] and Proposition 7 ) that if an analytic control system is linearizable by a formal transformation, then it is linearizable by an analytic transformation. Kang [50] also gives a class of nonlinearizable three-dimensional analytic control systems which are equivalent to their normal forms by analytic transformations. Those are the only results about convergence of the step-by-step normalizing transformations known to us to this date (see, however, the C∞ -smooth and/or analytic normal forms of [9], [40], [46], [69], [75], [95]). In this section, we study a class of nonlinear systems called special strict feedforward forms, and we show that this class could be brought to its normal form (actually canonical form) via analytic transformations. Consider an analytic single-input control system x˙ = f (x, u), in strict feedforward form, that is, such that fj (x, u) = fj (xj+1 , . . . , xn , u), 1 ≤ j ≤ n. Notice that each component decomposes uniquely as fj (x, u) = aj (xj+1 ) + Fj (xj+1 , . . . , xn , u),
with Fj (xj+1 , 0, . . . , 0) = 0 (4.80)
A (special strict feedforward form) SSFF is an analytic strict feedforward form for which aj (xj+1 ) = kj xj+1 ,
whenever
∂aj (0) = 0 ∂xj+1
(4.81)
The main result of this section is given in the following theorem [87]. THEOREM 33
Consider an analytic special strict feedforward form given by (4.80) and (4.81). There exists an analytic feedback transformation that brings the system (4.80) and
0882-Perruquetti-ch04_R2_180805
4.13
Analytic Normal Forms: A Class of Strict Feedforward Systems
(4.81) into the normal form 2 z˙ 1 = z2 + n+1 i=3 zi P1,i (z2 , . . . , zi ) .. . z˙ = z + n+1 z2 P (z , . . . , z ) j j+1 i i=j+2 i j,i j+1 SSFNF : . .. 2 P z˙ n−1 = zn + zn+1 n−1,n+1 (zn+1 ) z˙ n = v
255
(4.82)
where Pj,i (zj+1 , . . . , zi ) are analytic functions of the indicated variables, and zn+1 = v. The main remark is that the normal form itself is in a strict feedforward form. Moreover, this normal form coincides with the canonical form defined elsewhere [83]. This leads to the following theorem. THEOREM 34
Two special strict feedforward systems (SSFF)1 and (SSFF)2 are feedback equivalent if and only if their normal forms SSFNF are equal (after possible reparametrization zi = λxi ). The proof of Theorem 33 is detailed elsewhere [87]. The proof of Theorem 34 follows automatically after normalization of the first nonlinearizable homogeneous vector field because no components of the special strict feedforward forms depend on the first variable x1 . It has been proved earlier [87] that special strict feedforward forms define the only class of strict feedforward systems that can be brought to a normal form, still being in strict feedforward form. Indeed, if z˙ = f˜ (z, v) is another analytic strict feedforward form, that is, such that f˜j (z, u) = a˜ j (zj+1 ) + F˜ j (zj+1 , . . . , zn , v),
with F˜ j (zj+1 , 0, . . . , 0) = 0 (4.83)
for any 1 ≤ j ≤ n, then we have THEOREM 35
The system (4.83) is feedback equivalent to a special strict feedforward form if and only if a˜ j (zj+1 ) = k˜ j zj+1 ,
whenever
∂ a˜ j (0) = 0 ∂zj+1
that is, the system is in special strict feedforward form in its coordinates.
0882-Perruquetti-ch04_R2_180805
256
Feedback Equivalence of Nonlinear Control Systems
Whether it is possible to bring any strict feedforward system into its normal form NF by analytic transformation is unclear yet, but if true, the normal form will no longer be strict feedforward. We refer the reader elsewhere [87] for more details.
4.14
Conclusions
This chapter, as its name indicates, is an attempt to summarize the diverse results about normal forms obtained in the past two decades using a formal approach. Starting from the pioneer work of Poincaré (Section 4.2), we then described, in Section 4.3, normal forms for single-input control systems obtained by Kang and Krener using classical Poincaré’s technique. The work of Kang and Krener was completed by the authors to obtain canonical forms, dual normal, and dual canonical forms. Those results were discussed, respectively, in Section 4.4 to Section 4.6. Results in previously mentioned sections concern single-input control systems with controllable linearization. The uncontrollable linearization case as well as the multiinput case came as a generalization of previous results, respectively, in Section 4.7 and Section 4.8. In each of those sections, the results obtained have been compared to results in earliest sections and have been shown to be their generalizations. The feedback linearization of control systems was originally the first problem dealt with in feedback classification. However, we have chosen to introduce the results regarding this only in Section 4.9 in order to make a parallelism between the formal approach that provides a step-by-step procedure of linearization and the classical approach using distributions. Although the main results concern continuous time control systems, it would be unfair not to mention the discrete time case. Thus we have devoted Section 4.10 to normal forms of discrete time control systems. This formal approach, introduced by Kang and Krener for control systems, has proved to be very useful in analyzing systems. If we had enough space, we could widen our chapter, among other topics, to bifurcations, stabilization, and observability of control systems. A complete description of symmetries of control systems has been obtained by the authors using this formal approach, and these results are described in Section 4.11. The same approach has led to a step-by-step characterization of systems feedback equivalent to feedforward systems or to strict feedforward systems. For each degree of homogeneity, necessary and sufficient conditions were obtained and presented in Section 4.12. The amazing point about these notions is that they are all nicely related and have the same roots: normal and canonical forms. Indeed, we have shown that symmetries are described by canonical forms either in the analytic or formal category.
0882-Perruquetti-ch04_R2_180805
References
257
On the other hand, feedforward and strict feedforward systems are geometrically characterized in Section 4.12 using symmetries. Finally, in Section 4.13, it turns out that one of the biggest class (ever found) of control systems that could be brought to a normal and canonical form, using analytic transformations, is a subclass of strict feedforward systems. The important number of references listed in this chapter illustrates the interest in the notions presented here, and we may have certainly omitted many others. The interested reader will probably complete our work in this matter.
References 1. A.A. Agrachev and R.V. Gamkrlidze, Feedback invariant optimal control theory and differential geometry, I. Regular extremals, J. Dynamical and Control Systems, (3) 1997, pp. 343–389. 2. A.A. Agrachev, Feedback invariant optimal control theory and differential geometry, II. Jacobi curves for singular extremals, J. Dynamical and Control Systems, 4(1998), pp. 583–604. 3. V.I. Arnold, Geometrical Methods in the Theory of Ordinary Differential Equations, 2nd ed., Springer-Verlag, 1988. 4. A. Astolfi and F. Mazenc, A geometric characterization of feedforward forms, in Proceedings of the MTNS’2000, Perpignan, France, 2000. 5. S. Battilotti, Semiglobal stabilization of uncertain block-feedforward forms via measurement feedback, in Proceedings of the NOLCOS’98, Enschede, the Netherlands, 1998, pp. 342–347. 6. J.-P. Barbot, S. Monaco, and D. Normand-Cyrot Quadratic forms and approximative feedback linearization in Discrete Time, Int. J. Control, 67, 567–586, 1997. 7. V. Bogaevski and A. Povzner, Algebraic Methods in Nonlinear Physics, SpringerVerlag, New York, 1991. 8. B. Bonnard, Feedback equivalence for nonlinear systems and the time optimal control problem, SIAM J. Control Optim., 29, 1300–1321, 1991. 9. B. Bonnard, Quadratic control systems, Math. Control, Signals, Syst., 4, 1991, 139–160. 10. A. Bressan and F. Rampazzo, On differential systems with quadratic impulses and their applications to Lagrangian mechanics, SIAM J. Control Optim., 31, 1205–1230, 1993. 11. R.W. Brockett, Feedback invariants for nonlinear systems, in Proceedings of the IFAC Congress, Helsinki, 1978. 12. A.D. Bruno, W. Hovingh, and C.S. Coleman, The Local Method of Nonlinear Analysis of Differential Equations, Springer Series in Soviet Mathematics, Springer, Berlin, 1989. 13. E. Cartan, Théorie des groupes finis et continus et la géométrie différentielle traitées par la méthode du repère mobile, Gauthier-Villars, Paris, 1937.
0882-Perruquetti-ch04_R2_180805
258
Feedback Equivalence of Nonlinear Control Systems
ˇ 14. S. Celikovsky and H. Nijmeijer, Equivalence of nonlinear systems to triangular form: the singular case, Syst. Control Lett., 27, 135–144, 1996. 15. L. Cremean, W.B. Dunbar, D.V. Goh, J. Hickey, E. Kavins, J. Meltzer, and R. Murray, The Caltech Multi-Vehicle Wireless Testbed, Proceedings of 40th CDC, Las Vegas, USA, 2002. 16. E. Delaleau and W. Respondek, Lowering the orders of derivatives of controls in generalized state-space systems, J. Math. Syst. Est. Contr., 8, 427–453, 1998. 17. W.B. Dunbar and R. Murray, Model predictive control of coordinated multivehicle formations, Proceedings of 40th CDC, Las Vegas, USA, 2002. 18. M. Flies, J. Lévine, and P. Rouchon, Generalized state variable representation for a simplified crane description, Int. J. Control, 58, 277–283, 1993. 19. M. Fliess, J. Lévine, P. Martin, and P. Rouchon, Flatness and defect of nonlinear systems: Introductory theory and examples, Int. J. Control, 6, 1327–1361, 1995. 20. M. Fliess, J. Lévine, P. Martin, and P. Rouchon, A Lie-Bäcklund approach to equivalence and flatness of nonlinear systems, IEEE Trans. Autom. Contr., 44, 922–937, 1999. 21. R.B. Gardner, The method of Equivalence and its Applications, CBMS Regional Conference Series in Applied Mathematics, CBMS 58, SIAM, 1989. 22. R.B. Gardner and W.F. Shadwick, Symmetry and the implementation of feedback linearization, Syst. Contr. Lett., 15, 25–33, 1990. 23. R.B. Gardner and W.F. Shadwick, The GS algorithm for exact linearization to Brunovský normal form, IEEE Trans. Autom. Contr., 37, 224–230, 1992. 24. R.B. Gardner, W.F. Shadwick, and G.R. Wilkens, Feedback equivalence and symmetries of Brunovský normal forms, Contemp. Math., 97, 115–130, 1989. 25. R.B. Gardner, W.F. Shadwick, and G.R. Wilkens, A geometric isomorphism with applications to closed loop controls, SIAM J. Control Optim., 27 (6), 1361– 1368, 1989. 26. J.W. Grizzle and S.I. Marcus, The structure of nonlinear systems possessing symmetries, IEEE Trans. Autom. Contr., 30, 248–258, 1985. 27. B. Hamzi, Analyse et commande des systèmes non linéaires non commandables en première approximation dans le cadre de la théorie des bifurcations, Ph.D. thesis, University of Paris XI-Orsay, France, 2001. 28. B. Hamzi, J.-P. Barbot, and W. Kang, Bifurcation and topology of equilibrium sets for nonlinear discrete-time control systems, in Proceedings of the Nonlinear Control Systems Design Symposium (NOLCOS’98), 1998, pp. 35–38. 29. B. Hamzi, J.-P. Barbot, and W. Kang, Stabilization of nonlinear discretetime control systems with uncontrollable linearization, in Modern Applied Mathematics Techniques in Circuits, Systems and Control, World Scientific and Engineering Society Press, 1999, pp. 278–283. 30. B. Hamzi, J.-P. Barbot, and W. Kang, Normal forms for discrete time parameterized systems with uncontrollable linearization, Proceedings of the 38th IEEE Conference on Decision and Control, vol. 2, 1999, pp. 2035–2038. 31. B. Hamzi, J.-P. Barbot, and W. Kang, Bifurcation for discrete-time parameterized systems with uncontrollable linearization, Proceedings of the 38th IEEE Conference on Decision and Control, vol. 1, 1999, pp. 684–688. 32. B. Hamzi, J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Normal forms versus Naimark-Sacker bifurcation control, invited paper to the Nonlinear Control Systems Design Symposium (NOLCOS’01), 2001.
0882-Perruquetti-ch04_R2_180805
References
259
33. B. Hamzi, J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Nonlinear discretetime control of systems with a Naimark-Sacker bifurcation, Syst. Control Lett., 44, 245–258, 2001. 34. B. Hamzi and I.A. Tall, Normal forms for nonlinear discrete-time control systems, Proceedings of the 42nd IEEE Conference on Decision and Control, 2, 1357–1361, 2003. 35. J. Hauser, S. Sastry, and P. Kokotovi´c, Nonlinear control via approximate input-output liearization, IEEE Trans. Autom. Control, 37, 392–398, 1992. 36. L.R. Hunt and R. Su, Linear equivalents of nonlinear time varying systems, in Proceedings of the MTNS, Santa Monica, CA, 1981, pp. 119–123. 37. L.R. Hunt, R. Su and G. Meyer, Design for multi-input nonlinear systems, in Differential Geometric Control Theory, R.W. Brockett, R. Millman, and H.J. Sussmann, Eds., Birkhauser, 1983, pp. 268–298. 38. A. Isidori, Nonlinear Control Systems, 3rd ed., Springer-Verlag, London, 1995. 39. M. Jankovic, R. Sepulchre, and P. Kokotovic, Constructive Lyapunov stabilization of nonlinear cascade systems, IEEE Trans. Autom. Control, 41, 1723–1735, 1996. 40. B. Jakubczyk, Equivalence and invariants of nonlinear control systems, in Nonlinear Controllability and Optimal Control, H.J. Sussmann, Ed., Marcel Dekker, New York, Basel, 1990, pp. 177–218. 41. B. Jakubczyk, Invariants of dynamic feedback and free systems, in Proceedings of the European Control Conference, Groningen, 1993. 42. B. Jakubczyk, Critical Hamiltonians and feedback invariants, in Geometry of Feedback and Optimal Control, B. Jakubczyk and W. Respondek, Eds., Marcel Dekker, New York, Basel, 1998, pp. 219–256. 43. B. Jakubczyk, Symmetries of nonlinear control systems and their symbols, Can. Math. Conf. Proceed., 25, 183–198, 1998. 44. B. Jakubczyk, Feedback invariants and critical trajectories; Hamiltonian formalism for feedback equivalence, in Nonlinear Control in the Year 2000, vol. 1, A. Isidori, F. Lamnabhi-Lagarrigue, and W. Respondek, Eds., LNCS vol. 258, Springer, London, 2000, pp. 545–568. 45. B. Jakubczyk and W. Respondek, On linearization of control systems, Bull. Acad. Polon. Sci. Ser. Math., 28, 517–522, 1980. 46. B. Jakubczyk and W. Respondek, Feedback classification of analytic control systems in the plane, in: Analysis of Controlled Dynamical Systems, B. Bonnard, B. Bride, J.P. Gaúthier, I. Kupka, Eds., Birkhäuser, Boston, 1991, pp. 262–273. 47. V. Jurdjevic, Casimir elements and Optimal control, in B. Jakubczyk, W. Respondek, and T. Rzezuchowski, Eds., Geometry in Nonlinear Control and Differential Inclusions, No. 32, Banach Center Publications, Warsaw, 1995, pp. 261–275. 48. V. Jurdjevic, Optimal control problems on Lie groups: crossroads between geometry, and mechanics, in Geometry of Feedback and Optimal Control, B. Jakubczyk and W. Respondek, Eds., Marcel Dekker, New York, 1997, pp. 257–303. 49. T. Kailath, Linear Systems, Prentice-Hall, Englewood Cliffs, NJ, 1980. 50. W. Kang, Extended controller form and invariants of nonlinear control systems with single input, J. Math. Syst., Estimation Control, 4, 1994, 1–25.
0882-Perruquetti-ch04_R2_180805
260
Feedback Equivalence of Nonlinear Control Systems
51. W. Kang, Quadratic normal forms of nonlinear control systems with uncontrollable linearization, Proceedings of the 34th CDC, New Orleans, 1995. 52. W. Kang, Bifurcation and normal form of nonlinear control systems — part I and part II, SIAM J. Control Optim., 36, 193–212 and 213–232, 1998. 53. W. Kang, Normal form, invariants, and bifurcations of nonlinear control systems in the particle deflection plane, in Dynamics, Bifurcations and Control, F. Colonius and L. Grüne, Eds., LNCS Vol. 273, Springer, Berlin, Heidelberg, 2002, pp. 67–87. 54. W. Kang and A.J. Krener, Extended quadratic controller normal form and dynamic feedback linearization of nonlinear systems, SIAM J. Control Optim., 30, 1319–1337, 1992. 55. W. Kang, Bifurcation control via state feedback for systems with a single uncontrollable mode, SIAM J. Control Optim., 38, 1428–1452, 2000. 56. A.J. Krener, Approximate linearization by state feedback and coordinate change, Syst. Control Lett., 5, 181–185, 1984. 57. A.J. Krener, S. Karahan, M. Hubbard, and R. Frezza, Higher order linear approximations to nonlinear control systems, Proceedings of the 26th IEEE Conference on Decision and Control, Los Angeles, 1987, pp. 519–523. 58. A.J. Krener, W. Kang, and D.E. Chang, Normal forms of linearly uncontrollable nonlinear control systems with a single input, NOLCOS, St. Petersburg, 2001. 59. A.J. Krener, W. Kang, and D.E. Chang, Normal forms and bifurcations of control systems, in Proceedings of 39th IEEE Conference on Decision and Control, 2000, pp. 1602–1607. 60. A.J. Krener, W. Kang, and D.E. Chang Control Bifurcations, IEEE Trans. Automa. Control, 49 (8), 1231–1246, 2004. 61. A.J. Krener and L. Li Normal forms and bifurcations of discrete time nonlinear control systems, SIAM J. Control Optim., 40, 1697–1723, 2002. 62. I. Kupka, On feedback equivalence, in Proceedings of the Canadian Mathematical Society Conference, vol. 12, 1992, pp. 105–117. 63. A. Marigo, Constructive necessary and sufficient conditions for strict triangularizability of driftless nonholonomic systems, in Proceedings of the 34th CDC, Phoenix, Arizona, USA, 1999, pp. 2138–2143. 64. F. Mazenc and L. Praly, Adding integrations, saturated controls, and stabilization for feedforward forms, IEEE Trans. Autom. Control, 41, 1559–1578, 1996. 65. F. Mazenc and L. Praly, Asymptotic tracking of a reference state for systems with a feedforward structure, Automatica, 36, 2000, 179–187. 66. H. Nijmeijer and A.J. van der Schaft, Nonlinear Dynamical Control Systems, Springer-Verlag, New York, 1990. 67. H. Poincaré, Sur les propriétés des fonctions définies par les équations aux différences partielles, Oeuvres, pp. XCIX–CX, Gauthier-Villars, Paris, 1929. 68. J.-B. Pomet, A differential geometric setting for dynamic equivalence and dynamic linearization, in Geometry in Nonlinear Control and Differential Inclusions, B. Jakubczyk, W. Respondek, and T. Rzezuchowski, Eds., vol. 32, Banach Center Publications, Warszawa, 1995, pp. 319–339. 69. W. Respondek, Feedback classification of nonlinear control systems in R2 and R3 , in Geometry of Feedback and Optimal Control, B. Jakubczyk and W. Respondek, Eds., Marcel Dekker, New York, 1998, pp. 347–382.
0882-Perruquetti-ch04_R2_180805
References
261
70. W. Respondek, Symmetries and flat outputs of nonlinear control systems, dans New Trends in Nonlinear Dynamics and Control, W. Kang, M. Xiao, and C. Borges, Eds., LNCS vol. 295, Springer, 2003. 71. W. Respondek, Transforming a single input system to a p-normal form via feedback, in Proceedings of the 42nd IEEE Conference on Decision and Control, Maui, Hawai, pp. 1574–1579. 72. W. Respondek and I.A. Tall, How many symmetries does admit a nonlinear single-input control system around an equilibrium? in Proceedings of the 40th IEEE Conference on Decision and Control, Orlando, Florida, 2001, pp. 1795–1800. 73. W. Respondek and I.A. Tall, Nonlinearizable single-input control systems do not admit stationary symmetries, Syst. Control Lett., 46, 1–16, 2002. 74. W. Respondek and I.A. Tall, Strict feedforward form and symmetries of nonlinear control systems, in Proceedings of the 43rd IEEE Conference on Decision and Control, Bahamas, 2004 pp. 1611–1616. 75. W. Respondek and M. Zhitomirskii, Feedback classification of nonlinear control systems on 3-manifolds, Math. Control, Signals Syst., 8, 299–333, 1995. 76. R. Sepulchre, M. Jankovi´c, and P. Kokotovi´c, Constructive Nonlinear Control, Springer, Berlin, 1996. 77. I.A. Tall, Classification des systèmes de contrôles non linéaires à une entrée, Thèse de 3eme cycle, University of Dakar, 1999. 78. I.A. Tall and W. Respondek, Transforming nonlinear single-input control systems to normal forms via feedback, in Proceedings of the Mathematical Theory of Networks and Systems, Perpignan, 2000. 79. I.A. Tall and W. Respondek, Normal forms, canonical forms, and invariants of single input nonlinear systems under feedback, in Proceedings of the 39th IEEE Conference on Decision and Control, Sydney, Australia, 2000, 1625–1630. 80. I.A. Tall and W. Respondek, Transforming a single-input nonlinear system to a feedforward form via feedback, in Nonlinear Control in the Year 2000, Vol. 2, A. Isidori, F. Lamnabhi-Lagarrigue and W. Respondek, Eds., LNCS Vol. 259, Springer, London, 2000, pp. 527–542. 81. I.A. Tall and W. Respondek, Normal forms and invariants of nonlinear single-input systems with uncontrollable linearization, in Proceedings of NOLCOS’2001, ST. Petersburg, Russia, 2001, pp. 139–144. 82. I.A. Tall and W. Respondek, Feedback equivalence to feedforward forms for nonlinear single-input control systems, in Dynamics, Bifurcations and Control, F. Colonius and L. Grüne, Eds., LNCS vol. 273, Springer, Berlin, 2002, pp. 269–286. 83. I.A. Tall and W. Respondek, Feedback classification of nonlinear singleinput control systems with controllable linearization: normal forms, canonical forms, and invariants, SIAM J. Contr. Optim, 41, 1498–1531, 2003. 84. I.A. Tall and W. Respondek, Feedback equivalence to a strict feedforward form of nonlinear single-input control systems, Int. J. Control, in press. 85. I.A. Tall and W. Respondek, Feedback classification of nonlinear single-input control systems with uncontrollable linearization, (submitted). 86. I. A. Tall and W. Respondek, Normal forms of two-inputs nonlinear control systems, submitted in Proceedings of the 41st IEEE Conference on Decision and Control, Las Vegas, USA, 2002, pp. 2732–2737.
0882-Perruquetti-ch04_R2_180805
262
Feedback Equivalence of Nonlinear Control Systems
87. I.A. Tall and W. Respondek, Smooth Analytic normal forms: a special class of strict feedforward systems, in Proceedings of Symposium on Nonlinear Control and Observe Design, SYNCOD, Stuttgart, Springer, 2005. 88. I.A. Tall, Normal forms of multi-inputs nonlinear control systems with controllable linearization, in New Trends in Nonlinear Dynamics and Control, and their applications, W. Kang, M. Xiao, and C. Borges, Eds., LNCS vol. 295, Springer, Berlin-Heidelberg, 2003, pp. 87–100. 89. I.A. Tall, Feedback classification of multi-input nonlinear control systems, Siam J. Control Optim., 43, 2049–2070, 2005. 90. A. Teel, Feedback stabilization: nonlinear solutions to inherently nonlinear problems, Memorandum UCB/ERL M92/65. 91. A. Teel, A nonlinear small gain theorem for the analysis of control systems with saturation, IEEE Trans. Autom. Control, 41, 1256–1270, 1996. 92. S. Sastry, Nonlinear Systems: Analysis, Stability, and Control, Springer-Verlag, 1999. 93. H.J. Sussmann, Symmetries and integrals of motion, in Geometry in Nonlinear Control and Differential Inclusions, ibid. pp. 379–393. 94. A.J. van der Schaft, Symmetries in optimal control, SIAM J. Control Optim., 25, 245–259, 1987. 95. M. Zhitomirskii and W. Respondek, Simple Germs of Corank One Affine Distributions, Banach Center Publications, vol. 44, 1998, pp. 269–276.
0882-Perruquetti-ch05_R2_170805
5 Singular Perturbation and Chaos
M. Djemai and S. Ramdani
CONTENTS 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Autonomous Chaotic Dynamical Systems . . . . . . . . . . . . . . . 5.2.1 Background on Nonlinear Dynamical Systems . . . . . . . 5.2.2 Linearization, Stability, and Invariant Manifolds . . . . . 5.2.3 Strange Attractors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.4 Structural Stability and Bifurcations . . . . . . . . . . . . . . 5.3 Singularly Perturbed Systems . . . . . . . . . . . . . . . . . . . . . . . . 5.3.1 Some Fundamental Notions . . . . . . . . . . . . . . . . . . . . 5.3.2 Integral Manifold Approach . . . . . . . . . . . . . . . . . . . . 5.3.2.1 Approached Resolution of the Condition (5.22) 5.4 Illustrative Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.1 An Electronic Oscillator: Chua’s Cubic System . . . . . . . 5.4.2 A Neuron Model: The Hindmarsh and Rose System . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1
. . . . . . . . . . . . . .
263 264 264 265 265 266 267 268 272 274 275 276 280 285
Introduction
In the last decade, significant advances have been made in the theory of nonlinear state feedback control [3]. It is well known that many physical systems naturally possess a time-scale separation. Singular perturbation theory provides the mean to decompose such systems into slow and fast dynamics which greatly simplifies their structural analysis and any subsequent control design. The most significant development in the analysis and control of nonlinear singularly perturbed systems has been the integral manifold approach [5, 6, 34]. The dynamical behavior of such systems is geometrically captured by the rapid approach of the fast system states to the attractive slow integral manifold. The fundamental property of the 263
0882-Perruquetti-ch05_R2_170805
264
Singular Perturbation and Chaos
integral manifold is that once the fast system states hit the integral manifold, they remain on the manifold thereafter. This fundamental property is described by the integral manifold condition, an ε-dependent partial differential equation. The small parameter ε is the speed ratio of the slow versus the fast system dynamics [2]. For nonlinear singularly perturbed systems, the composite state feedback law is the sum of slow and fast parts. The fast one steers the fast system states to the slow integral manifold. It is designed so as to be inactive on this manifold. By equating coefficients to like powers of ε in the integral manifold condition, it becomes possible to design a slow control that will steer the system along a desired manifold to within any required order of ε accuracy. The paradigm of deterministic chaos is certainly one of the most interesting phenomena observed and studied during the second half of the 20th century. It has changed our vision of some irregular and apparently stochastic behaviors of systems involved in many fields of modern science, from biology to celestial mechanics. There are many different approaches in the study of chaotic dynamical systems. We can distinguish two large fields in the analysis of these problems: a theoretical one based on mathematical analysis and an experimental one using numerical methods. This second more empirical field is actually developed through nonlinear time series analysis methods (see, e.g., [20]). In this chapter, we will briefly recall some of the basic tools of the mathematical and geometrical theories of dynamical systems (which are detailed in Chapter 2). In particular, we will focus on those tools characterized by chaos and singular perturbation phenomenon.
5.2 5.2.1
Autonomous Chaotic Dynamical Systems Background on Nonlinear Dynamical Systems
From a mathematical point of view, chaotic dynamical systems are deterministic and nonlinear systems which exhibit the property of sensitive dependence on initial conditions (SDIC). This dependence means that two initially very close states of the system will exponentially diverge over the course of time. This divergence is quantified by the Lyapunov exponent. If time is considered as a continuous variable, a chaotic dynamical system is often defined by a set of first-order ordinary differential equations (ODE):
dx = x˙ = f (x) dt
(5.1)
0882-Perruquetti-ch05_R2_170805
5.2
Autonomous Chaotic Dynamical Systems
265
where t ∈ I ⊂ R, x ∈ Rn (n-dimensional space), and f : U → Rn is a smooth function defined on some subset. If the vector field f does not contain time explicitly, the system defined by (5.1) is said to be autonomous. A solution or flow of (5.1) defined by φ : U × I → Rn , φ : (x, t) → φ(x, t) satisfies:
d φ(x, t) dt
= f (φ(x, s))
(5.2)
t=s
for all x ∈ U and s ∈ I. See Chapter 2 for more details and theoretical results.
5.2.2
Linearization, Stability, and Invariant Manifolds
The description of the solutions of (5.1) near a fixed point x¯ can be made using a local linearization and by studying the linear system: δ˙ = Jf (¯x)δ
(5.3)
where Jf (¯x) = (∂fi /∂xj )x=¯x is the Jacobian matrix of f at x¯ and δ = x − x¯ ∈ Rn , δ 1 (where ·denotes the Euclidean norm). Linear systems such as (5.3) are well known (Chapter 2 of [17]) and an integration leads to the solution flow etJf (¯x) .
5.2.3
Strange Attractors
In this chapter, we are interested in dissipative systems, which are the most common ones in physics and engineering. The dissipative property implies a constraint on the system’s dynamics. From a physical point of view, dissipative systems do not satisfy energy conservation laws [10]. Mathematically, this means that these systems do not have a Hamiltonian independent of time. In the phase space, dissipative systems are characterized by an attraction of all trajectories to a geometrical object called the attractor. This subset of the phase space is invariant under the transformation of the flow defined by Equation (5.1) over the course of time. There are many definitions of an attractor in the literature [1, 15] (see also Chapter 2) which are not always equivalent. The following definition is proposed in [1]. First we have to define the absorbing domains of the phase space associated to the solution flows of Equation (5.1): A domain of the phase space is said to be absorbing if it completely contains all positive semi-trajectories starting in it. If, in
DEFINITION 1
0882-Perruquetti-ch05_R2_170805
266
Singular Perturbation and Chaos
addition, every solution orbit falls into it after a finite time, it is said to be globally absorbing. We now come to the definition of an attractor defined by a solution flow φ of Equation (5.1): ¯ then If B is an absorbing domain with compact closure B, the set defined by: ¯ t) A= φ(B,
DEFINITION 2
t>0
is called an attractor of Equation (5.1). The attractor is said to be maximal if B is globally absorbing. Some attractors are very simple, such as stable fixed points for systems evolving toward stationary states or limit cycles that are the characterization of periodic dynamics. Attractors that are not points or cycles are called strange attractors. This term was first introduced by Ruelle and Takens [31] in their famous paper describing the nature of turbulence. The Lorenz attractor [15, 23] or Chua’s attractor [11, 12] are some of the most studied ones. For a chaotic system, the geometry of the attractor can be very complicated. This kind of attractor, defined by autonomous systems of ODEs given by Equation (5.1), cannot appear in phase spaces of less than three dimensions. They are characterized by noninteger fractal dimensions, and some of them show a self-similarity property which means that their global geometrical structures can be observed at different scales. One can find more details in the work of Mandelbrot, a pioneer in the field of fractal phenomena [24].
5.2.4
Structural Stability and Bifurcations
Another important concept of the theory of dynamical systems is the occurrence of bifurcations. Many dynamical systems have parameters appearing in their equations. When these parameter values (bifurcation values) are changed, one may observe modifications (bifurcations) of the qualitative structure of their solution flows. The local bifurcations of a system are studied by analyzing the vector field near an equilibrium point [9] (also see Chapter 2). Global bifurcations are related to the description of the global changes of flows when local analysis is not useful. In the global approach, particular trajectories are studied like homoclinic orbits (orbits connecting fixed points to themselves) or heteroclinic orbits (orbits connecting distinct fixed points).
0882-Perruquetti-ch05_R2_170805
5.3
Singularly Perturbed Systems
5.3
Singularly Perturbed Systems
267
The notion of singular perturbation disturbance in the analysis of dynamical systems is very important and represents the theoretical base of numerous modern concepts (i.e., bifurcation, chaos, regular perturbation, singular perturbation, etc.) This last case was originally developed for the analysis of phenomena with multiple time-scales characterizing the evolution of systems belonging to the domain of the mechanics of fluids. Later, this theory was extended to the study of the other phenomena characterized by singular perturbation. For example, induction motor [35, 36], robotics [39], etc. In 1952, Tikhonov discussed conditions for which the solution of a system of strangely disrupted common differential equations could be approached asymptotically by the solutions of two sub-systems: slow and fast [45]. In 1963, Vasiléva [46] proposed a solution to resolve ODE with singular perturbation [22] in terms of a sum of three series of solutions: internal, external, and intermediary.1 The introduction of the singular perturbation theory in the field of the control theory [40] led to results concerning the control of the singularly perturbed nonlinear systems from the concept of the well-known composed control [4, 41–43], which give a panorama of different and varied applications developed in this domain. The application of these results is relevant to two big problems of analysis in theory of control: 1. Systems of big dimension, implying “heavy” control to implement 2. Combined presence of physical phenomena in several scales of time, implying important numeric difficulties Recently, another approach, integral manifold was introduced to study, in a geometrical way, the behavior of the solutions of a singularly perturbed system [4, 37]. According to this approach, the fast dynamics of the system are forced on an attractive manifold on which the evolution of the system is described with a reduced model (also called slow system). The slow system has to represent, after a small period of time, the dynamics of the real system. The objectives of control can be fixed on the basis of this model. This simplifies the control procedure. Several applications using this approach were developed, notably in the domains of the robotics [44] and electrical machines [36]. 1 Internal solution (resp. external) describes the behavior of the system in (resp. outside) the limit layer; the intermediary solution connects the two other solutions.
0882-Perruquetti-ch05_R2_170805
268 5.3.1
Singular Perturbation and Chaos Some Fundamental Notions
Consider the following perturbed system: χ˙ = f (χ, ε)
(5.4)
with χ ∈ Rn and ε ∈ V0 ⊂ R. In Reference [5], the authors present a determining criterion for physical process of the form (5.4) to be written in the following standard form: x˙ = f (x, z, ε, t)
x(t0 ) = x0 x ∈ Rn
(5.5)
m
(5.6)
ε˙z = g(x, z, ε, t) z(t0 ) = z0 z ∈ R
Functions f and g are supposed to be enough continuously differentiable with respect to their arguments. Parameter ε is supposed to be “small” and represent the speed of evolution of the state dynamics z, (fast dynamics), with respect to x (slow dynamics). The classic method of analysis of singularly perturbed systems consist in showing a reduced order model obtained by putting ε = 0 in model (5.5) and model (5.6). Dimension of the state space then falls from n + m to n, because differential equation (5.6) “degenerates" into one algebraic equation: g(x, z, 0, t) = 0 (5.7) where x, z indicate the variable of system (5.5) and system (5.6) for ε = 0. System (5.5) and system (5.6) are in standard form if and only if the following hypothesis (5.7) is verified: HYPOTHESIS 1
In the considered domain, (5.7) possesses real roots isolated:2 z = (x, t) Hypothesis 1 holds when the function g(x, z, 0, t) is such that ∂g/∂z is regular; the solution is then unique. Furthermore, this allows us to use the implicit function theorem: THEOREM 1 (Implicit function theorem)
Let us consider two sets A ⊂ Rm and B ⊂ Rn and one function of class C∞ , F : A × B → Rn . One notes (x, y) = (x1 , . . . , xm , y1 , . . . , yn ) a point of A × B. Suppose that for a certain point (x0 , y0 ) ∈ A × B: F(x0 , y0 ) = 0 2 The root (x, t) is isolated if there exists ε > 0 such as Equation (5.7) does not admit another
solution different from this one for |¯z − (x, t)| < ε.
0882-Perruquetti-ch05_R2_170805
5.3
Singularly Perturbed Systems
and that the matrix:
269
∂f
1
∂y1 .. ∂F = . ∂y ∂fn ∂y1
··· ..
.
···
∂f1 ∂yn .. . ∂fn ∂yn
is not singular at the point (x0 , y0 ). Then, there are two open neighborhoods A0 of x0 in A and B0 of y0 in B as well as one unique function of class C∞ , G : A0 → B0 , such that: F(x, Gx) = 0 for any x ∈ A0 , that is, y = G(x) is a solution of F(x, y) = 0 with respect to y, defined around the point (x0 , y0 ). To resolve Equation (5.7): solution z¯ is an analytical function of the variable t and x. By using Gröbner’s formula3 [38]; this solution can be given by the following expression: z¯ = {e−
n
i=1 gi Lγi
(Id )}|z=z0
where gi is the ith component of the vector g and ∂g γi = ∂z |z=z0 i
THEOREM 2 [38]
Inverse function φ, solution of the equation, Y = h(w)
with
Y ∈ n ,
and w ∈ n
is given by the following formula w = φ(y, w0 ) = {eF(y,w0 ,.) Id }|w=w0 F(y, w0 , .) =
k
(yi − h(w0 )i )LDi (.)
i=1
3 Gröbner’s formula allows the calculation of the solution of an analytic equation of the form:
Y = h(w) with Y ∈ Rn and w ∈ Rn where h is an analytic function. One supposes that (∂h/∂w)w=w0 is invertible for any w0 for the neighborhood of it solution.
0882-Perruquetti-ch05_R2_170805
270
Singular Perturbation and Chaos
where Di represent the ith column of the inverse matrix it Jacobian of the function: def
D=
∂h ∂w
−1 w=w0
and yi and hi represent, respectively, the ith component of vectors y and h. Hypothesis 1 assures that for every root verifying Equation (5.7) one can associate a reduced model of order n correctly defined. To obtain the reduced model, one substitutes in z in (5.5) to obtain: x˙¯ = f (¯x, (¯x, t), 0, t),
x¯ (T0 ) = x0
(5.8)
Later, one considers this model expressed in the compact form by considering implicitly the function , or: x˙¯ = f (¯x, 0, t),
x¯ (t0 ) = x0
(5.9)
Model (5.9) is called a slow model, (almost steady-state model). Consider the following question: Given T > t0 , are the following approximations valid uniformly on the interval of time [t0 , T] ? x(t) = x¯ (t) + O(ε)
(5.10)
z(t) = z¯ (t) + O(ε)
(5.11)
Solution z¯ satisfies algebraic Equation (5.7), and z¯ (t0 ) is generally different from the given initial condition z0 ; approximation (5.11) is not so valid when t is equal (or close) to t0 . Consequently, (5.11) is valid only outside the limit layer defined for any t ∈ [t0 , t1 ]. Approximation (5.10) is uniformly valid because we can always choose x0 as the initial condition for variable x¯ (with x¯ (t0 ) = x0 ) . To analyze the behavior of the solution z¯ in the limit layer [viz, where the approximation (5.11) is not valid], one introduces the change of time-scale: τ=
t − t0 ε
In this scale of “dilated” time, system (5.5) and system (5.6) are written, respectively, as: dx = εf (x, z, ε, ετ + t0 ) dτ dz = g(x, z, ε, ετ + t0 ) dτ
(5.12) (5.13)
0882-Perruquetti-ch05_R2_170805
5.3
Singularly Perturbed Systems
271
Equation (5.12) and Equation (5.13) show that z evolves more quickly than x which stays in its limit layer, close to its initial values x(0) = x0 . By assuming ε = 0 in (5.12) and (5.13), one obtains the fast dynamics, described by the equation: dz = g(x0 , z, 0, t0 ) dτ
(5.14)
To determine the component of the solution z(t) which evolves quickly in the limit layer, one defines the variable zˆ = z − z¯ . Because d¯z/dτ = 0 [due to the fact that x is supposed to be constant in the fast time-scale and when z¯ = (x, ε)], the evolution of zˆ in the limit layer is described by the following dynamics: dˆz = g(x0 , zˆ (τ ) + z¯ (t0 ), 0, t0 ) dτ
(5.15)
with zˆ (0) = z0 − z¯ (t0 ). Therefore, a “finer” approximation [with regard to that given in (5.11)] of the exact solution z(t) is given by the following relation:
t − t0 z(t) = z¯ (t) + zˆ ε
+ O(ε)
(5.16)
REMARK 1
To improve the approximation order in ε, we can substitute the function (x, ε) at any prefixed order of approximation to z in (5.5). REMARK 2
With regard to (5.11), approximation (5.16) contains the term zˆ (τ ) which represents the fast component of the solution z, whereas z¯ represents the slow component. In fact: dˆz dτ 1 dˆz 1 dˆz = = = g(x0 , zˆ (τ ) + z¯ (t0 ), 0, t0 ) dt dτ dt ε dτ ε To guarantee the validity of approximation (5.16), one needs to study the stability of system (5.15). For this, the following hypotheses are proposed. HYPOTHESIS 2
The appropriate values of the matrix {∂g/∂z} estimated along x¯ , z¯ , for any t ∈ [t0 , T], are with negative real parts. If zˆ (0) is not close to 0 [z0 is very different of z¯ (t0 )], one needs a supplementary hypothesis to assure the stability of system (5.15).
0882-Perruquetti-ch05_R2_170805
272
Singular Perturbation and Chaos
HYPOTHESIS 3
The equilibrium point zˆ (τ ) = 0 of system (5.15) is uniformly asymptotically stable, for any x0 and t0 , and the initial point zˆ (0) = z0 − z¯ (t0 ) belongs to the attraction domain of the manifold z = z¯ . If Hypothesis 2 is satisfied, then lim zˆ (τ ) = 0 when τ → ∞, namely, solution z(t) will be close to z¯ from a certain moment t1 > t0 . It is important to note that if Hypothesis 3 is satisfied, then the roots of the algebraic Equation (5.7) are isolated and consequently Hypothesis 1 is also satisfied. Finally, one recalls the fundamental theorem of Tikhonov, which allows to confirm approximations (5.10) and (5.16). THEOREM 3 (Tikhonov [45])
If Hypotheses 2 and 3 are satisfied, then approximations (5.10) and (5.16) are valid for any t ∈ [t0 , T] and there exists t1 ≥ t0 such as (5.11) is valid for any t ∈ [t1 , T]. REMARK 3
In Theorem 3, time instant t1 depends strongly on the value of the parameter ε. The reader is referred to Kokotovic et al. [4], where some variants of Theorem 3 are presented and applied.
5.3.2
Integral Manifold Approach
The main objective of the integral manifold approach is to present a geometrical point of view regarding the behavior of slow and fast states as trajectories in Rn+m . One considers a class of singularly perturbed systems: x˙ = f (x, z)
x(t0 ) = x0 x ∈ Rn
(5.17)
ε˙z = g(x, z)
m
(5.18)
z(t0 ) = z0 z ∈ R
where the dependence of f and g in ε and t was removed so as to simplify the statement of the concepts which follow. Let Mε be the manifold of Rm , parameterized by ε, and defined as: def Mε = (x, z) ∈ Rn × Rm : z = (x, ε)
(5.19)
0882-Perruquetti-ch05_R2_170805
5.3
Singularly Perturbed Systems
273
One says that Mε is an invariant manifold for system (5.5) and system (5.6) if it is invariant with respect to the dynamics of this system, that is:
DEFINITION 3
z(t0 , ε) = (x(t0 , ε), ε) ⇒ z(t, ε) = (x(t, ε), ε) ∀ t ≥ t0
(5.20)
To obtain the manifold, one proceeds as follows: By deriving (5.20) with respect to t, one obtains: z˙ =
∂ f (x, (x, ε)) ∂x
(5.21)
by multiplying (5.21) by ε and by using (5.18), one obtains:
∂ g(x, (x, ε), ε) = ε f (x, (x, ε)) ∂x def
(5.22)
Relation (5.22), called condition of invariant manifold, must be satisfied by for any x belonging to the considered domain, for any t ≥ t0 , and for every ε ∈ [0, ε∗ ], where ε is a constant positive. It characterizes the invariance of the variety Mε . The resolution of (5.22) with regard to is difficult because it requires the resolution of a partial differential equation. As one will see later, the development of the exact solution (., ε), allows one to find approached solutions (explicits) which can be satisfactory for applications (recall that parameter ε is small). η, the distance between the state z and its manifold Mε , is:
NOTE
def
η = z − (x, ε) Then system (5.17) and system (5.18) expressed as a function of x and, from η, respectively, we obtain x˙ = f (x, (x, ε) + η)
∂ ε η˙ = g(x, (x, ε) + η) − ε f (x, (x, ε) + η) ∂x
(5.23)
The invariance of the manifold Mε is then characterized by η = 0. Indeed, if η = 0 (i.e., if one is on the manifold Mε ), then one obtains η˙ = 0.
0882-Perruquetti-ch05_R2_170805
274
Singular Perturbation and Chaos
Consequently, the evolution of system (5.17) and system (5.18) can be expressed by the dynamics of the following reduced system: x˙ = f (x, (x, ε)) with x(t0 ) = x0
(5.24)
Then, one calls Mε a slow manifold, in the sense that in every manifold Mε corresponds one slow model of (5.24). When η = 0, by putting formally ε = 0 in (5.23) and (5.24) and by considering the change of time-scale τ = (t − t0 )/ε, the equation expressing the dynamics of the variable η(τ ) in the new time-scale, is given by: dη = g(x0 , (x0 , 0) + η(τ )) dτ
(5.25)
REMARK 4
Equation (5.25) is similar to Equation (5.15); consequently, the variable zˆ , corresponds to the variable η in the approach of integral manifold and z¯ corresponds to (x, 0). Solution z(t) is then written as z(t) = (x, 0) + η(τ ) + O(ε) Under Hypotheses 2 and 3 of Theorem 3, M0 is a stable manifold (attractive) of the system (5.25). This system describes trajectories of x and η, which, for any given x0 , are on one fast manifold defined by x = x0 = constant, and approaches quickly toward the manifold M0 . For ε = 0 but “small,” fast manifold shows solutions which quickly approach the slow manifold Mε . 5.3.2.1 Approached Resolution of the Condition (5.22) This procedure requires that functions f and g can be developed in a Taylor’s series with power of ε. For function g, one obtains: g(x, 0 (x) + ε1 (x) + · · · ) = g(x, 0 (x)) +
∂g ε1 (x) + · · · ∂z
(5.26)
where ∂g/∂z and all the derivatives of higher order are estimated in x and z = 0 (x). One calculates the development of the function f (x, , ε, t) around the point ε = 0.
0882-Perruquetti-ch05_R2_170805
5.4
Illustrative Examples
275
By substituting function in the condition (5.22) and by the development of a Taylor’s series with powers of ε: (x, ε) = 0 (x) + ε1 (x) + ε 2 2 (x) + · · ·
(5.27)
one can calculate iteratively 0 , 1 , etc., and then identify the terms of the same power in ε. As an immediate consequence of (5.22), (5.19), (5.27), and (5.26), one obtains: g(x, 0 (x), u) = 0 (x, 0) = 0 (x)
(5.28) (5.29)
REMARK 5
One notes that solution 0 corresponds to solution z¯ in the algebraic Equation (5.7). With 0 (x) known, one identifies terms in ε of power 1, and one obtains:
∂g 1 (x) = ∂z
−1 z=0 (x)
∂0 (x) f (x, 0 (x)) ∂x
Now, with 0 (x) and 1 (x) known, one can identify terms in ε of power 2, and obtain 2 (x) and so on until some wished order [4]. As the existence of solutions 1 , 2 , . . . is connected to the invertibility of the Jacobian of the function g, evaluated at z = 0 , this invertibility is guaranteed by Hypothesis 1.
5.4
Illustrative Examples
In this section, we describe two singularly perturbed chaotic systems without applying all the previous theoretical results. Our purpose is to show that this type of model can be found in different scientific fields (e.g., electronics and neurophysiology) and to point out some of the advantages of the singular perturbation methods. For both these systems, we will compute the slow manifold M0 and describe some of their dynamical properties. One of the main ideas of the singular perturbation approach in the study of chaotic dynamical systems is to provide geometrical elements for the description of these systems. These elements can help in understanding
0882-Perruquetti-ch05_R2_170805
276
Singular Perturbation and Chaos j
E0 v
M r
id C1
L
u
FET
j
D
C
FIGURE 5.1 The Chua’s cubic electronic oscillator.
and controlling their chaotic dynamics since they are based on analytical equations that are not sensitive to initial conditions. 5.4.1 An Electronic Oscillator: Chua’s Cubic System The following model describes the dynamics of an electronic relaxation oscillator circuit with a nonlinear cubic characteristic [11, 28]. It is composed of a harmonic oscillator based on a field effect transistor (FET) coupled to a relaxation oscillator based on a tunnel diode (see Figure 5.1). The electric analysis of this circuit leads to the following threedimensional nonlinear system: εx˙ = z − Fµ (x) y˙ = −z
(5.30)
z˙ = cx + y + dz where x, y, and z are, respectively, proportional to the voltages ν, u and to the current i. ε = C1 /C (C1 C), Fµ (x) = ax3 + bx2 + µx which is due to the shape of the id function of ν, and µ is a bifurcation parameter; c and d are related to the electrical components of the circuit r, L, C, M. Generally, the parameters values are: ε = 0.001, a = 44/3, b = 41/2, c = −0.7, and d = 0.24. The fast system associated to the slow one (5.30) is defined by x = z − Fµ (x) y = −εz z = ε cx + y + dz
(5.31)
where x = dx/dτ and t = ετ . For µ = 2, we observe a chaotic attractor showed on Figure 5.2. This model has three fixed points: two unstable focuses (O1 and O2 ) and a
0882-Perruquetti-ch05_R2_170805
5.4
Illustrative Examples y 0
277 10
–10
10 5 z
0 –5 –10 –1.5
–1
–0.5
0
x
0.5
FIGURE 5.2 Chua’s cubic attractor for µ = 2 (5.30) with initial conditions: x0 = 0.5, y0 = −0.5, z0 = 1.
saddle (P). The coordinates of these points can be found by writing the vanishing condition of the vector field defined by (5.30): z − Fµ (x) = 0 z=0
(5.32)
cx + y + dz = 0 which implies: Fµ (x) = 0 y = −cx
(5.33)
z=0 The resolution of the third-order equation Fµ (x) = 0 for µ = 2 leads to three real distinct solutions which are the abscises of the three fixed points of (5.30) in the phase space. The second equation of (5.33) gives the y-coordinate. Finally, the third equation of (5.33) states that these three points are situated in the plane z = 0. Equations (5.30) define a singularly perturbed two time-scale model with one fast variable (x) and two slow ones ( y and z). The slow or critical manifold [obtained by setting ε = 0 in (5.30), see [19, 21]) associated to this singularly perturbed system is a cubic cylinder defined by (see Figure 5.3): M0 = (x, y, z) ∈ R3 : z = Fµ (x) (5.34)
0882-Perruquetti-ch05_R2_170805
278
Singular Perturbation and Chaos 10
y
0 –10 – 20
10
5 z
0
–5 –1.5
–1
– 0.5 x
0
0.5
FIGURE 5.3 Slow manifold M0 associated to system (5.30).
This manifold is composed of two stable attractive parts on which the slow dynamics take place (see Figure 5.4). The fast dynamics, which are parallel to the x-axis, connect the two slow parts. The global dynamics are alternatively slow and fast following a sort of dichotomy of motion. If an initial state is located near the first unstable focus O1 , the trajectories will slowly move away around it until they reach an unstable part of M0 , called the fold [7, 8]. There, the fast motion, which is parallel to the x-axis, replaces the slow one. Then, the trajectory takes place with a slow motion on a part of the second attractive sheet of M0 called the co-fold. The co-fold is simply the projection of the fold along the direction of the fast motion (see Figure 5.4 and Figure 5.5). After some time, this trajectory will reach the second fold of the other attractive part where the fast dynamics re-inject the solution near the initial conditions on the first attractive sheet in the neighborhood of the first unstable focus O1 (see Figure 5.5). This re-injection process, which is essential in this type of phenomena, does not always take place at the same point of the neighborhood of the fixed point O1 . This is due to the sensitivity to initial conditions: a small perturbation of these conditions will affect the re-injection point and the number of divergent oscillations observed on the first attractive sheet of the slow manifold M0 . Note that contrary to the first unstable focus O1 , the saddle point P and the second unstable focus O2 are located on folds (see Figure 5.5).
0882-Perruquetti-ch05_R2_170805
5.4
Illustrative Examples
279
FIGURE 5.4 A representation of the slow manifold M0 of Chua’s cubic system. The fast trajectories, which are parallel to the x-axis, are drawn using double arrows. The slow ones are represented with simple arrows. The straight lines AA and DD indicate the co-folds and the lines BB and CC the folds. The co-folds are simply the projections of the folds along the direction of the fast motion. A re-injection point is also shown.
FIGURE 5.5 The global motion of the Chua’s cubic system with the fast trajectories (double arrows) and the slow ones (simple arrows) is shown in the plane Oxy. The unstable focuses O1 and O2 are shown as the saddle point P. A re-injection point is also shown. The fixed points O2 and P are located on folds and are called pseudo-singular points.
0882-Perruquetti-ch05_R2_170805
280
Singular Perturbation and Chaos
This destroys the symmetry of the dynamics on the two attractive sheets of M0 . P and O2 points are called pseudo-singular points (more details and alternative methods to study this type of models can be found in [7, 8, 28–30]). Figure 5.2 is obtained by the numerical integration of Equations (5.30) with initial conditions x0 = 0.5, y0 = −0.5, and z0 = 1.
5.4.2 A Neuron Model: The Hindmarsh and Rose System The following model, the Hindmarsh and Rose model, (HR) is an extension of the FitzHugh–Nagumo system [14, 26] which is a reduced form of the famous Hodgkin–Huxley model [18]. It was proposed in 1984 [16] to describe the dynamics of action potentials in the neuron of a pond snail. It became a reference model in the nonlinear dynamical approach of studying neural systems behaviors [27]. Many different studies have been devoted to the HR model. For example, Wang proposed a mathematical analysis of the bursting oscillations observed in this model [33]. A bifurcation analysis was performed by Fan and Holden [13]. Sabbagh [32] and Milne and Chalabi [25] proposed different approaches to control its chaotic oscillations. The (HR) equations are generally presented with the fast time-scale: x = y − x3 + 3x2 − z y = 1 − 5x2 − y z = ε (4x + K − z)
(5.35)
In Equations (5.35), x represents the membrane potential of the neuron, y is the recovery variable, and z is the variable quantifying the mechanism regulating the patterns of discharges [25]. The associated slow system is defined by: εx˙ = y − x3 + 3x2 − z εy˙ = 1 − 5x2 − y z˙ = 4x + K − z
(5.36)
where ε = 0.004 and K is a bifurcation parameter. For K = 3.18, we observe chaotic bursting oscillations (see the attractor shown in Figure 5.6). The model has only one equilibrium point of the saddle type. This point is defined by solving the equation: x3 + 2x2 + 4x + K − 1 = 0 which has only one real solution.
(5.37)
0882-Perruquetti-ch05_R2_170805
5.4
Illustrative Examples
281
FIGURE 5.6 The chaotic attractor of the HR model obtained by numerical integration for K = 3.18 and ε = 0.004, with initial conditions x(0) = 0.6798, y(0) = 0.3825, and z(0) = 0.0415.
The system defined by Equations (5.36) is a singularly perturbed two time-scale model with two fast variables (x and y) and one slow variable (z). The critical manifold M0 is defined by:
y − x3 + 3x2 − z = 0 1 − 5x2 − y = 0
(5.38)
We deduce the equations defining M0 : M0 = (x, y, z) ∈ R3 : y = 1 − 5x2 ; z = 1 − 2x2 − x3
(5.39)
This manifold is the intersection of two cylinders: a parabolic one and a cubic one. It is a curve in the three-dimensional phase space on which the slow dynamics will take place. Figure 5.7, Figure 5.8, and Figure 5.9, show, respectively, the chaotic temporal evolutions of the HR model variables for x(t), y(t), and z(t) obtained by the numerical integration of Equations (5.36) with initial conditions x0 = 0.6798, y0 = 0.3825, and z0 = 0.0415 [25].
500
FIGURE 5.7 The chaotic temporal evolutions x(t).
–2
–1.5
x
1000
1500
2000
t
282
–1
– 0.5
0.5
1
1.5
x (t) 2
0882-Perruquetti-ch05_R2_170805
Singular Perturbation and Chaos
y
FIGURE 5.8 The chaotic temporal evolutions y(t).
–15
–12.5
–10
–7.5
–5
– 2.5
2.5
y(t)
500 1000 1500 2000
t
5.4
5
0882-Perruquetti-ch05_R2_170805
Illustrative Examples 283
z (t)
500
FIGURE 5.9 The chaotic temporal evolutions z(t).
– 0.4
– 0.3
z
1000 1500
2000
t
284
– 0.2
– 0.1
0.1
0.2
0.3
0.4
0882-Perruquetti-ch05_R2_170805
Singular Perturbation and Chaos
0882-Perruquetti-ch05_R2_170805
References
285
References 1. D.V. Anosov and V.I. Arnol’d, Dynamical Systems I, Springer-Verlag, Berlin, 1988. 2. J.P. Barbot, N. Pantalos, S. Monaco, and D. Normand-Cyrot, On the control of singularly perturbed nonlinear systems, in Proceedings of the IFAC-NOLCOS Symposium, 453–458, 1992. 3. A. Isidori, Nonlinear Control Systems: An Introduction, 2nd ed., Springer-Verlag, Berlin, 1989. 4. P.V. Kokotovic, H.K. Khalil, and J. O’Reilly, Singular Perturbation Methods in Control: Analysis and Design, Academic Press, London, 1986. 5. R. Marino and P.V. Kokotovic, A geometric approach to nonlinear singularly perturbed control systems, Automatica, 24, 31–41, 1988. 6. V.A. Sobolev, Integral manifolds and decomposition of singularly perturbed systems, Syst. Cont. Lett., 5, 169–179, 1984. 7. J. Argémi, Approche qualitative d’un problème de perturbations singulières dans R4 , Equadiff. 78, Convegno Int. su equazioni differenziali ed equazioni funzionali, 1978, 333–340. 8. J. Argémi and B. Rossetto, Solutions périodiques discontinues pour l’approximation singulière d’un modèle neurophysiologique dans R4 — une métaphore dans R3 avec chaos, J. Math. Biol., 17, 67–92, 1983. 9. V.I. Arnol’d, Dynamical Systems V, Springer-Verlag, Berlin, 1994. 10. P. Bergé, Y. Pomeau, and C. Vidal, L’ordre dans le chaos, Hermann, Paris, 1984. 11. L.O. Chua, M. Komuro, and T. Matsumoto, The double scroll family, IEEE Trans. Circ. Syst., CAS-33 (11), 1072–1118, 1986. 12. L.O. Chua and G. Lin, Canonical realization of Chua’s circuit family, IEEE Trans. Circ. Syst., CAS-37 (7), 885–902, 1990. 13. Y. Fan and A.V. Holden, Bifurcation, burstings, chaos and crises in the Rose–Hindmarsh model for neuronal activity, Chaos Solitons Fract., vol. 3, 439–449, 1993. 14. R. FitzHugh, Impulses and physiological states in theoretical models of nerve membrane, Biophys. J., 1, 445–466, 1961. 15. J. Guckenheimer and P. Holmes, Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields, 5th ed., Springer-Verlag New York, 1997. 16. L. Hindmarsh and R.M. Rose, A model of neuronal bursting using three coupled first order differential equations, Proc. R. Soc. B, 221, 87–102, 1984. 17. M.W. Hirsh and S. Smale, Differential Equations, Dynamical Systems and Linear Algebra, Academic Press, New York, 1974. 18. A.L. Hodgkin and A.F. Huxley, A quantitative description of membrane current and its application to conduction and excitation in nerve, J. Physiol., 117, 500–544, 1952 19. C. KRT Jones, Geometric singular perturbation theory, Dynamical Systems, Montecatini Terme, Lecture Notes in Mathematics, vol. 1609, Springer-Verlag, Berlin, 1994, 44–118. 20. H. Kantz and T. Shreiber, Nonlinear Time Series Analysis, Cambridge University Press, 1997.
0882-Perruquetti-ch05_R2_170805
286
Singular Perturbation and Chaos
21. T.J. Kaper, An introduction to geometric methods and dynamical systems theory for singular perturbation problems, in Analyzing Multiscale Phenomena using Singular Perturbation Methods, Proceedings of Symposia in Applied Mathematics, vol. 56, American Mathematical Society, Baltimore, 1998, 85–131. 22. N. Levinson, Perturbations of discontinuous solutions of nonlinear systems of differential equations, Acta Math., 82, 71–106, 1950. 23. E.N. Lorenz, Deterministic non-periodic flow, J. Atmos. Sci., 20, 130–141, 1963. 24. B.B. Mandelbrot, The Fractal Geometry of Nature, Freeman, San Francisco, 1985. 25. A.E. Milne and Z.S. Chalabi, Control analysis of the Rose–Hindmarsh model for neural activity, IMA J. Math. Appl. Med. Biol., 18, 53–75, 2001. 26. J.S. Nagumo, S. Arimoto, and S. Yoshizawa, An active pulse transmission line simulating nerve axon, Proc. IRE, 50, 2061–2071, 1962. 27. M.I. Rabinovich and H.D.I. Abarbanel, The role of chaos in neural systems, Neuroscience, 87, 5–14, 1998. 28. S. Ramdani, Variétés lentes de systèmes dynamiques chaotiques considérés comme lents-rapides — Applications aux Lasers, Ph.D. Thesis, 1999. 29. S. Ramdani, B. Rossetto, L.O. Chua, and R. Lozi, Slow manifolds of some chaotic systems with applications to laser systems, Int. J. Bifurcat. Chaos, 10 (12), 2729–2744, 2000. 30. B. Rossetto, T. Lenzini, S. Ramdani and G. Suchey, Slow-fast autonomous dynamical systems, Int. J. Bifurcat. Chaos, 8 (11), 2135–2145, 1998. 31. D. Ruelle and F. Takens, On the nature of turbulence, Commun. Math. Phys., 20, 167–192, 1971. 32. H. Sabbagh, Control of chaotic solutions of the Hindmarsh–Rose equations, Chaos Solitons Fract., 11, 1213–1218, 2000. 33. X.J. Wang, Genesis of bursting oscillations in the Hindmarsh–Rose model and homoclinicity to a chaotic saddle, Physica D, 62, 263–274, 1993. 34. J. Carr, Application of Center Manifold Theory, Springer Verlag, New York, 1981. 35. M. Djemai and J.P. Barbot, Singularly perturbed method for the control design of a synchronous motor with its PWM inverter, in Proceedings of the IEEE Conference on Control Application, 1995. 36. M. Djemai, J. Hernandez, and J.P. Barbot, Nonlinear control with flux observer for a singularly perturbed induction motor, in Proceedings of the IEEE Conference on Decision and Control, 32nd, 1993, 3391–3396. 37. N. Fenichel, Persistence and smoothness of invariant manifolds for flows, Indiana Univ. Math. J., 21, 193–226, 1971. 38. W. Gröbner, Serie di Lie e Loro Applicazioni, Poliedro, Cremonese, Roma, 1973. 39. J. Hernandez and J.P. Barbot, Sliding observer-based feedback control for flexible joints manipulators, Automatica, 32 (9), 1243–1254, 1996. 40. P.V. Kokotovi´c and P. Sannuti, Singular perturbation method for reducing model order in optimal control design, IEEE Trans. Automat. Contr., 13 (4), 377–384, 1968. 41. D.S. Naidu, Singular perturbation methodology: in control systems, IEEE Control Engineering Series No. 34, London U.K., Peter Peregrims LTD, 1988. 42. B. Porter, Singular perturbation methods in the design of full-observers for multivariable linear systems, Int. J. Contr., 26, 589–594, 1977.
0882-Perruquetti-ch05_R2_170805
References
287
43. V. Saksena, J. O’Reilly, and P.V. Kokotovic, Singular perturbations and timescale methods in control theory: Survey 1976–1983, Automatica, 20 (3), 273–293, 1984. 44. M. Spong, K. Khorasani, and P.V. Kokotovi´c, An integral manifold approach to the feedback control of flexible joints robot, IEEE J. Robot. Automat., 3 (4), 291–300, 1987. 45. A.N. Tikhonov, Systems of differential equations containing small parameters multiplying some of derivatives, Mat. Sub., 31, 575–586, 1952. 46. A.B. Vasileva, Asymptotic behaviour of solutions to certain problems involving nonlinear ordinary differential equations containing a small parameter multiplying the highest derivatives, Russ. Math. Survey, 18, 13–84, 1963.
0882-Perruquetti-ch05_R2_170805
0882-Perruquetti-ch06_R2_290705
Part II
Closed-Loop Design
0882-Perruquetti-ch06_R2_290705
0882-Perruquetti-ch06_R2_290705
6 Control of Chaotic and Hyperchaotic Systems
L. Laval
CONTENTS 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 Chaos Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.1 The OGY Method . . . . . . . . . . . . . . . . . . . . . 6.2.2 The Pyragas Method . . . . . . . . . . . . . . . . . . . 6.2.3 H ∞ -Control of Chaos . . . . . . . . . . . . . . . . . . 6.2.4 Adaptive Control of Chaos . . . . . . . . . . . . . . 6.2.5 Sliding Mode Control of Chaos . . . . . . . . . . . 6.2.6 Energy-Based Sliding Mode Control of Chaos 6.3 Hyperchaos Control . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 The YLM Method for Hyperchaos Control . . . 6.3.2 Enhanced YLM-Method with AAM . . . . . . . . 6.3.2.1 The AAM Mechanism . . . . . . . . . . . 6.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.1
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
. . . . . . . . . . . . . .
291 294 294 299 302 304 306 309 312 312 315 315 317 318
Introduction
Since the seminal work of Ott, Grebogy, and York [43], who demonstrated the ability to stabilize Unstable Periodic Orbits (UPOs) among those embedded in a chaotic attractor, control of chaotic systems has become an extensive field of research.1 Such an interest is, indeed, motivated by many reasons. For instance, by essence, chaotic systems are highly sensitive to 1 The pioneer work of Hübler [30] is another important starting point in this field.
291
0882-Perruquetti-ch06_R2_290705
292
Control of Chaotic and Hyperchaotic Systems
(tiny) variations of system parameters, initial conditions, and external disturbances. Therefore, in some processes, chaos may lead to harmful or even catastrophic situations2 if not subdued. In such cases, the main purpose then is to reduce the chaotic phenomena as much as possible, by means of intentional and suitable control signals applied to the system. As another motivation, in some practical contexts, bringing of chaotic dynamics into a process or exploiting the chaotic nature of a system may efficiently avoid some costly and painful tasks.3 For instance, as pointed out by Ott et al. [43], a chaotic attractor is composed of a dense set of UPOs. Then, a key idea is to associate some of these orbits with different tasks to perform.4 Thus, instead of designing, making, and using several devices, the same chaotic system can serve multiple purposes by simply switching, in a controlled manner, among the different orbits of interest. In such a case, the use of chaos then involves stabilizing trajectories of interest,5 while preserving, as much as possible, some of the inherent properties of chaotic (possibly hyperchaotic6 ) systems. Another motivation to deal with chaos control is that introduction of particular control laws or modification of the experimental conditions may lead some nonchaotic systems (initially) to perform undesirable chaotic behaviors (i.e., some transitions from order to chaos, sometimes referred to as “chaotification” [13]). Recovery of original properties such as functionality, stability, . . . then implies both design and application of suitable control laws (e.g., see in Gills et al. [25], the “green problem” related to laser systems). Finally, owing to their intrinsic properties (such as sensitive dependence on initial conditions, inherent instability, sensitivity to perturbations and disturbances, etc.) the control of chaos appears to be an interesting challenge to achieve high performance near the stability boundaries. Such motivations have lead to a huge amount of proposals of chaos control methodologies (e.g., see [3, 13, 22, 36]), and reports on successful applications to experimental processes (e.g., [58]). The current chapter aims at presenting some of these methodologies (which are by no means the only ones valid), hoping to help the readers in understanding the basics regarding this field. In particular, this chapter focuses on two main classes 2 For example, if not clearly understood or controlled, the chaotic nature of some chemical reactions may lead to critical instabilities. 3 See Ditto and Munakata [19] for some practical applications such as the use of chaotic sensitivity to perturbations to nudge the ISEE-3 spacecraft near a comet with clever burns of fuel. 4 As illustrative example, some orbits may be associated to performance criteria, in order to characterize some tasks in progress. 5 In some particular cases, this control purpose may be, nevertheless, reduced to the stabilization of either fixed points or arbitrarily chosen closed orbits (not necessarily related to existing UPOs). 6 Chaotic systems with more than one positive Lyapunov exponent.
0882-Perruquetti-ch06_R2_290705
6.1
Introduction
293
of methods. The first one, essentially due to investigations of physicists and mathematicians, consists of model-independent control methods that aim at directly exploiting the intrinsic properties of chaotic systems to stabilize either (unstable) fixed points or (unstable) periodic orbits. Motivated by suitability to experimental applications, such methods are highly interesting as they usually require limited on-line computation and often make use of experimental procedures to quantify most of the control law parameters for both design and application. Among these methods, this chapter essentially highlights two representative chaos control methodologies: the so-called OGY method ([43, 58]) and Pyragas method [47], as these methods are pioneers in the field and have given rise to many investigations and successful applications (e.g., see [17] for the control of a magnetoelastic ribbon). However, in many cases, this class of methods suffers from the lack of suitable theoretical frameworks to perform rigorous analysis of closed-loop stability [48]. This drawback has, therefore, been a major motivation for introducing the other class under consideration in this chapter, which consists of adapted or extended conventional control techniques coming from the control theory framework. However, with regard to the huge number of existing techniques (dedicated to chaos control), the presentation will be restricted to widely known strategies: the H∞ approach [72], adaptive control [5], and sliding mode control [62, 63], within the context of either dealing with chaotic systems as standard nonlinear ones (i.e., without any direct exploitation of the true nature of chaos) or taking into account some intrinsic properties of chaotic systems (such as the fact that orbits of uncontrolled chaotic systems are confined within a bounded region of the phase space). This chapter is organized as follows. Section 6.2 deals first with some model-independent control methods. Then, some control strategies based on the control theory framework are presented. Finally, Section 6.3 focuses on some recent methods dedicated to the control of hyperchaotic systems.
PRELIMINARY REMARK Chaos control methods, presented in the sequel, can be regarded as belonging to the context of “deterministic chaos,” as they essentially consider known (reference) orbits or small neighborhoods of expected system states for either global or local control purposes. However, it is worth mentioning that most of local control approaches [such as the OGY method, the Pyragas method, and (local) H∞ control] rely implicitly or directly on the properties and results7 of ergodic theory (of chaos), which ensures that the system trajectories will always reach expected subsets of the state space where the control has to start acting (effectively). Readers are referred to Appendix A 7 Such as ergodicity, Poincaré’s recurrence theorem, Birkhoff’s ergodic theorem, etc.
0882-Perruquetti-ch06_R2_290705
294
Control of Chaotic and Hyperchaotic Systems
and to the references therein for some complementary informations about such an important and useful probabilistic approach of chaos.
6.2
Chaos Control
Both inherent properties of chaotic processes and uncertainties on system dynamics (including uncertainties on system parameters and neglected dynamics) often complicate experimental applications of chaos control techniques. Therefore, over the past few years, a great deal of attention has been paid to model-independent control methods (i.e., without any refined mathematical description of the chaotic process). In this context, this section starts with the focus on two major techniques: the OGY method8 and time-delayed feedback control schemes (i.e., the Pyragas method).
6.2.1 The OGY Method As previously mentioned, any chaotic system exhibits an extremely dense set of unstable periodic orbits (infinite in number) embedded within the attractor [43]. This fact, combined with the ergodicity9 of chaotic orbits, then guarantees that the system trajectory, within the attractor, will always reach (in finite time) close neighborhoods of any point of any UPO. In addition, chaotic systems are highly sensitive to perturbations; therefore, any small disturbance (and, therefore, any control signal) can radically modify their evolution. By considering such properties, Ott, Grebogy, and York proposed [43] a seminal chaos control methodology (referred to as the OGY method) to stabilize some selected UPOs, without drastically altering the inherent chaotic dynamics of the original system. From a technical viewpoint, this methodology essentially consists in constraining the system trajectory to fall on a predetermined stable manifold related to a hyperbolic10 fixed point of interest, by applying a small time-dependent perturbation on a selected system parameter when the trajectory visits an arbitrarily close neighborhood of the targeted orbit (the so-called OGY region). Thus, to summarize, this methodology involves: (1) the selection of an UPO of interest for stabilization purpose; (2) a suitable framework 8 The underlying conceptual framework of the OGY method is still an important theoretical basis for investigations, as emphasized by some recent developments about control of highdimensional and hyperchaotic systems. 9 A dynamical system is said to be ergodic if the average time spent by a trajectory in any region of the phase space is proportional to the volume of that region (see Birkhoff’s ergodic theorem in Appendix A). 10 A saddle point.
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
295
for analyzing local stability properties; (3) the design of a control signal according to this entire framework. These steps and the essence of the OGY method can be understood, in a more detailed manner, as follows. Consider the controlled system defined by the differential equation x˙ = f (x, ε)
(6.1)
where x ∈ Rn is an n-dimensional state vector,11 and f is a vector-valued function which characterizes the system dynamics. ε ∈ R is a system parameter, assumed to be accessible for external adjustment within a small interval around a nominal value ε0 (i.e., ε ∈ [ε0 − |εmax | ; ε0 + |εmax |], where εmax ∈ R is the maximum admissible change in the parameter ε to preserve the inherent properties of the original chaotic system). In the following, and without loss of generality, we will consider ε0 ≡ 0. In addition, consider a targeted trajectory, as a solution of (6.1) with, for convenience, ε being equal to the nominal value ε0 . Then, with respect to the (local) stabilization problem under consideration, both capturing of inherent properties of the chaotic attractor structure and setting of a suitable framework for local stability analysis, can be performed by means of the Poincaré section method (see Figure 6.1 and Figure 6.2). Applying this method then leads to the definition of a map (referred to, in the present
System trajectory
Surface of the Poincaré section FIGURE 6.1 Chaotic trajectory. 11 Ott et al. considered, originally, a three-dimensional system to introduce their control
method.
0882-Perruquetti-ch06_R2_290705
296
Control of Chaotic and Hyperchaotic Systems
Unstable Periodic Orbit (UPO)
ζf
Surface of the Poincaré section FIGURE 6.2 The Poincaré section and an UPO.
context, as a controlled Poincaré map) of the form: F : Rn−1 × R (ζ , ε) −→ F (ζ , ε) ∈ Rn−1 for which ζ represents a point where the orbit intersects the surface of the Poincaré section (when considering one direction for the piercing), F is assumed to be differentiable, and F(ζ , ε) stands for the point where the orbit, starting from ζ , first returns to the surface while keeping the input ε constant. Then, iterating the map12 leads to the following discrete-time dynamical system related to the flow of (6.1), ζk+1 = F(ζk , εk )
(6.2)
where ζk represents the kth intersection of the orbit with the surface (with respect to the piercing direction) and εk is the value of ε between ζk and ζk+1 corresponding time instants. Now, without loss of generality, let us assume that the targeted orbit intersects the surface of the Poincaré section in only one fixed point13 assumed to be hyperbolic, and let us denote by ζf this fixed point (assumed to exist for ε = ε0 ; i.e., F(ζf , ε0 ) = ζf ) (see Figure 6.2 and 6.3). Moreover, without loss of generality, let us assume that ζf = 0. Then, due to sensitivity of chaotic systems to small perturbations, any change in the parameter ε induces a shift of the fixed point coordinates correspondingly. Thus, with 12 Such an operation leads any continuous-time periodic orbit to appear as a discrete-time orbit cycling trough a finite set of points lying on the surface of the section (where the number of crossing points, with respect to the piercing direction, depends on the periodicity of the orbit). 13 Hence, the targeted orbit under consideration here is of period one.
0882-Perruquetti-ch06_R2_290705
Chaos Control
Motion of ζf due to parameter pertubation
297
Sta ble sub man ifold
6.2
ζf
Un
sta
State s2, after one map iterate (uncontrolled)
Starting state s1
ble
su
bm
an
ifo
ld
State s3 after one map iterate with parameter perturbation
FIGURE 6.3 Schematic explanation of OGY method: curved trajectories follow the stable (sub)manifold toward the periodic point and the unstable (sub)manifold away from this point. Without any parameter perturbation, the state s1 evolves to the state s2. The effect of changing the parameter ε is depicted as shifting the states near ζf along the solid black arrows. The combination of the unperturbed trajectory and the effect of the perturbation induces a shift of the fixed point and its (sub)manifolds, so that the next iterate, s3, falls on the stable (sub)manifold. Once on the stable (sub)manifold, the trajectory naturally tends toward the desired periodic orbit.
some mild assumptions on both ε and ζf variations, the OGY method suggests to linearize the Poincaré map about the desired fixed point ζf and the nominal parameter ε0 , so as to obtain a local linearized model of the form,14 ζk+1 = A ζk + B εk (6.3) where A is the Jacobian matrix of F(•, ε0 ) evaluated at ζf , B = ∂F/∂ε(ζf , ε0 ) is the derivative of F with respect to the parameter ε, ζk = ζk − ζf , and εk = εk − ε0 . Then, as previously mentioned, assuming the fixed point is a saddle, there exist two eigenvalues of the surface at ζf , λs , and λu , which satisfy |λs | < 1 < |λu | (where the subscripts s and u stand, respectively, for stable and unstable). Accordingly, there exist two associated right eigenvectors, wu and ws , defined as wuT A = λu wuT and wsT A = λs wsT , and such 14 Recall that, for convenience but without loss of generality, ζ and δ are assumed to be such 0 f that ζf = 0 and δ0 = 0.
0882-Perruquetti-ch06_R2_290705
298
Control of Chaotic and Hyperchaotic Systems
that vuT wu = 1, vsT ws = 1, vuT ws = 0, vsT wu = 0, where vu and vs are two left eigenvectors satisfying Avu = λu vu and Avs = λs vs . Finally, assuming ζk be located within a neighborhood of the desired fixed point, the control problem then consists in selecting εk so that ζk+1 T
be put onto the stable manifold (i.e., to select εk so that wu ζk+1 = 0). For this purpose, doting (6.3) with wu leads, finally, to define a control law of the form15 [43, 70], εk = −λu
wuT ζk wuT B
(6.4)
which can be used to design the (small) control signal, provided the magnitude of the right-hand side is in [ε0 − |εmax | ; ε0 + |εmax |]. Otherwise εk has to be set to zero (i.e., εk = ε0 ), because the control may not be able to bring the orbit to the fixed point. Finally, let us express some technical and concluding remarks: •
When ζk+1 falls on the stable submanifold (related to the fixed point of interest), the parameter ε can be set to its nominal value, because subsequently the orbit will approach the desired fixed point.
•
Amajor problem occurs for the incomplete measurement of the system state. However, this problem can be overcome by replacing the initial state vector x by the so-called delay coordinate vector16 (see [44, 59]) of the form: T X(t) = y(t), y(t − τ ), . . . , y(t − (m − 1)τ ) ∈ Rm where y is a (noise-free) system output available for measurement, m corresponds to the embedding dimension, and τ > 0 is a (selected) time delay (i.e., an embedding time). One can refer to the literature [53, 60] for further details on the selection of parameters m and τ .
•
The original OGY methodology considers saddle type fixed points that have both stable and unstable submanifolds. However, as pointed out by Yu et al. [69], the construction of stable and unstable (sub)manifolds for high dimensional chaotic systems is a technical challenge [40]. Thus, the OGY method appears to be mainly suitable for the control of lower dimensional chaotic systems.
15 Recall that ε = ε − ε , with ε assumed to be zero in the present case. 0 0 k k 16 Indeed, Takens [59] pointed out that, for sufficiently large embedding dimensions and
time delay, there exists a smooth and invertible mapping between the actual flow and the reconstructed flow (by means of time delay coordinates).
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
299
•
Ergodicity of chaotic orbits guarantees the reach, in finite time, of a neighborhood of the targeted orbit (see both Poincaré’s recurrence theorem and Birkhoff’s ergodic theorem in Appendix A). However, before the reaching of this neighborhood, the system evolves in a chaotic mannered (i.e., similar to an uncontrolled chaotic system). Thus, the waiting time can be quite long as it depends on both the (arbitrary) chosen initial conditions and the selected UPO (for stabilization purpose). However, to overcome this problem, various targeting methods have been proposed for reducing the waiting time (see [32] and references therein).
•
The OGY method is based on the linear approximation of the Poincaré map, which does not capture the nonlinear dynamics of the system. Therefore, in some cases (e.g., highly nonlinear systems), the control may not be able to bring the orbit to the fixed point, leading the system trajectory to leave the OGY region for wandering chaotically (as if there were no control) until the next reach of the neighborhood of interest.17
The OGY method has given rise to many extended or modified local control schemes which cannot be fully listed here (for detailed surveys, readers can refer to [13, 18, 28] and references therein). For instance, Yu et al. [69, 70] extended the OGY method to deal with high-dimensional systems by removing the reliance of the control on eigenvalues and eigenvectors of the system Jacobians. Aston and Bird [4] studied the extension of the immediate basin of attraction (i.e., the OGY region) by considering further regions. Romeiras et al. [49] proposed an extension of the method so that the control problem can be addressed by means of classical state feedback control design approaches, allowing for application to high-dimensional systems. Finally, it is worth mentioning a seminal modification, referred to as occasional proportional feedback ([31, 45], see also [66] and references therein for detailed information), which has lead to several successful applications (e.g., control of a chaotic state laser system [51], synchronization of diode resonators [42], and stabilization of chaotic fluctuations in the frequency emission from a tunable-diode laser [15]).
6.2.2 The Pyragas Method Pyragas [47] proposed an alternative model-independent control method to the OGY method, which gained widespread acceptance as it does not require any real-time computation and has been applied to many 17 This reach being guaranteed by the ergodicity property of the chaotic system (see Appendix A).
0882-Perruquetti-ch06_R2_290705
300
Control of Chaotic and Hyperchaotic Systems y(t)
Chaotic system y(t)
delay
+ K ( y(t) − y(t− τ))
K − y(t− τ)
FIGURE 6.4 Schematic representation of the Pyragas control scheme.
experimental processes including electronic, lasers, chemical systems, hydrodynamical systems, and cardiac systems (e.g., see some references in [3, 22]). This method, commonly referred to as the time-delayed autosynchronization method (TDAS), the time-delayed feedback control method (TDFC), or the Pyragas method, simply requires the accessibility to a scalar variable for measurement and, at least, one system input for external control, so as to perform a control scheme as depicted in Figure 6.4. From a technical viewpoint, this control scheme can be understood by considering a mathematical description of the form, z˙ (t) = Q(y(t), z(t))
(6.5)
y˙ (t) = P(y(t), z(t)) + u(t)
(6.6)
where y(t) is the output scalar variable (accessible for measurement), z(t) represents the remaining hidden variables of the dynamical system,18 u(t) is the input signal, and P and Q are two vector-valued functions of appropriate dimensions. Then, the use of the standard method of time-delay coordinates affords the possibility to extract, from measured variable y, various periodic signals of the form y(t) = yi (t), yi (t + Ti ) = yi (t), . . . where Ti represents the “period” of the ith UPO. To perform the stabilization of a selected UPO, the Pyragas method then consists in considering a simple external feedback control action u(t) of the form, u(t) = K y(t − τ ) − y(t) (6.7) where K is a negative feedback gain and τ represents a time delay. For a noise free, measured signal, stabilization of the ith UPO is then achieved when τ equals the period Ti (remark: in such a case, the control signal also vanishes). 18 The whole state vector x(t) is x(t) = z(t) y(t) T .
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
301
Finally, let us express some technical and concluding remarks: •
The Pyragas method has given rise to many investigations. For instance, Socolar et al. [56] proposed an extended version, referred to as ETDAS, which affords the stabilization of orbits that the basic TDAS cannot [1, 56]. This extension consists in replacing Equation (6.7) with a control law of the form, ∞ k−1 u(t) = K y(t) − (1 − R) R y (t − kτ ) , k ∈ N − {0} (6.8) k=1
for which, R ∈ [0, 1) is a suitable real parameter (R = 0 corresponds to the basic TDAS). However, for continuous-time systems, both numerical results and experiments have shown that for ETDAS to be successful, the feedback gain K must lie within a finite, and often narrow range [10]. •
As pointed out by Arecchi et al. [3], the use of control laws (6.7) or (6.8) transforms the original system equations into delayed differential ones. As a delayed system is richer than an instantaneous one, care should be taken in stabilizing a true UPO of the original unperturbed system rather than a spurious UPO introduced by the delay.
•
Within the Pyragas-type control context, rigorous analysis of the closed loop behavior is not trivial (e.g., see [10] for a stability analysis of ETDAS control scheme). Therefore, until recently, only numerical and experimental results concerning performance and limitations of the Pyragas method were proposed. However, Basso et al. [7, 8] introduced a bridge between the Pyragas approach and the classical feedback control theory by formulating the periodic orbit stabilization as an input–output L2 stability problem of a linear periodic feedback system. Such a framework then makes possible the use of some criteria in the L2 -setting (circle criterion, Willems criterion, etc.) to determine the stability bounds of the periodic orbit. Following the same purpose, Ushio [61] established, for a class of discrete-time systems, a necessary condition for stabilizability with a Pyragas controller (6.7). This result was extended for more general and continuous-time cases by Just et al. [35] and Nakajima [41]. These works also pointed out a limitation of the basic Pyragas method as well as its various modifications. This limitation is that any UPO with odd number of Floquet multipliers19
19 Given a periodic orbit , a Poincaré map P transverse to , and a fixed point ζ of lying f
on the surface associated to P, the Floquet multipliers are the eigenvalues of the linearization of P evaluated at ζf . Therefore, Floquet multipliers provide a method to analyze the stability of the periodic orbit.
0882-Perruquetti-ch06_R2_290705
302
Control of Chaotic and Hyperchaotic Systems whose modulus is greater than unity can never be stabilized by the delayed feedback control method. However, recently, this drawback was overcome by introducing, into the feedback loop, an unstable degree of freedom to artificially enlarge the set of these multipliers to an even number [48].
•
Finally, as pointed out in [22], control law (6.7) is sensitive to the selection of the time delay τ . Then, when the mandatory choice τ = T cannot be efficiently considered, an alternative empirical approach is to simulate the uncontrolled system with initial condition x(0) until the current state x(t) reaches a close neighborhood of a desired state x(s). Then, Equation (6.7) can be exploited by considering both τ = t − s as a reasonable estimate of the period, and vector x(t) as initial condition to start the control.
Both the OGY and the Pyragas methods are model-independent techniques that aim at stabilizing the periodic orbits by exploiting intrinsic properties of chaos. However, taming chaos can also be considered from the particular viewpoint of control theory, by means of strategies based on nominal, possibly uncertain, modeling of chaotic systems. Such a consideration has lead to a huge amount of proposals of control schemes, representatives of which are presented in the following sections. This presentation is nevertheless restricted here to some methods capable of dealing with one or more conditions that complicate experimental applications, namely: uncertainties on system parameters, neglected dynamics, noise affecting the measured signals, etc.
6.2.3
H ∞ -Control of Chaos
As established by Romeiras et al. [49], the OGY method can be extended so that the stabilization problem can be addressed by means of conventional state feedback control. Then, with regard to this conceptual framework, Jonckheere et al. [34] studied LQ control of chaos. Moreover, as a natural extension of this work, Bhajekar et al. [9] investigated the design of feedback controllers within the context of the H∞ approach (as a well-suited framework to deal with robust control problems [74]). This has lead to an H∞ (linear) control scheme whose strategy is presented as follows. With regard to the formal framework of the OGY method, consider a chaotic system defined by a recurrence equation20 of the form x(k + 1) = F (x(k), ε) , (k ∈ N), where x ∈ Rn is the state vector and ε ∈ R is a system parameter assumed to be accessible for external adjustment within a small interval around a nominal value ε0 . Moreover, let xf be the desired fixed point to which the system is intended to be driven. In addition, assume 20 Related, for instance, to a Poincaré map.
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
303
that a nominal, local, linear model of the actual system can be obtained from linearization about the desired fixed point xf (lying on a Poincaré section surface) and nominal parameter ε0 . Then, by considering an error signal z(k) as the weighted sum of the state error and the control effort, and an additive perturbation a(k) to characterize the neglected nonlinear dynamics, the controller design problem can be based on a (generalized) plant description of the form [9], x˜ (k + 1) = A x˜ (k) + B1 a(k) + B2 ε˜ (k) z(k) = C1 x˜ (k) + D11 a(k) + D12 ε˜ (k)
(6.9)
y(k) = C2 x˜ (k) + D21 a(k) + D22 ε˜ (k) where x˜ (k) = x(k) − xf , ε˜ (k) = ε(k) − ε0 , x(k) ∈ Rn denotes the state of the system (which may not be fully measurable); y(k) is the measured output; a(k) is the exogenous input; z(t) is a performance measure (i.e., the controlled error); ε(k) is the control input; and A, B1 , B2 , C1 , C2 , D11 , D12 , D21 , and D22 are constant matrices of appropriate dimensions. As considered in [9], assume that B1 = 1, C2 = 1, D11 = 0, D12 = I, D21 = D22 = 0. Moreover, in this context, consider the following usual assumptions: A1. A is assumed to be nonsingular (and therefore invertible) A2. (A, B2 ) is stabilizable and (C2 , A) is detectable Then, by considering the closed-loop transfer function Tza which maps a to z, the robust H∞ feedback control problem can be expressed as finding a (static) linear controller K∞ such that: ε˜ (k) = K∞ x˜ (k) Tza ∞ ≤ γ
with
0 < γ ≤ γoptimal
(6.10) (6.11)
Then, according to [6], the suboptimal H∞ controller which ensures that Tza ∞ < γoptimal is given by, ε˜ (k) = −BT P −1 A x˜ (k)
(6.12)
where = I + BBT − γ −2 I P, and P is the positive definite solution of the Generalized Algebraic Riccati Equation, C1T C1 + AT P −1 P − P = 0 with the existence condition γ 2 I − P > 0.
(6.13)
0882-Perruquetti-ch06_R2_290705
304
Control of Chaotic and Hyperchaotic Systems
x ( k + 1 ) = f ( x ( k ), e ) x if x in N(xf) ∆e max
e = ec else e = e0
ec
− ∆e max
~ e
H−infinity linear controller
e FIGURE 6.5 The (linear) H∞ control scheme, including a nonlinear saturation element to ensure admissible variations of ε (so that ε ∈ [ε0 − |εmax | ; ε0 + |εmax | ] , εmax ∈ R).
Finally, by considering that the measured output signal x(k) lies within an arbitrarily close neighborhood21 N(xf ) of the fixed point xf , the H∞ control strategy (as proposed in [9]) can then be summarized as shown in Figure 6.5. This H∞ control scheme can be viewed as a sort of bridge between control theory and OGY-type methods as it considers, in part, the same conceptual framework.22 However, note that, according to the control algorithm, the control action takes place when, with respect to the ergodicity property, the free system trajectory reaches a close neighborhood of the fixed point to stabilize, assuming that this neighborhood becomes invariant by means of the H∞ control action. Thus, when compared with conventional linear H∞ control, the current control scheme is of an unusual form as it involves a (robust) domain of attraction restricted here to local considerations.
6.2.4 Adaptive Control of Chaos In 1989, the pioneering work of Hübler [30] demonstrated some capabilities of an adaptive control scheme for dealing with chaotic systems. Since then, as a conventional and well-developed approach for controlling either certain or uncertain dynamical systems, adaptive and adaptivelike techniques have received a great deal of attention for the control of chaos [13, 23]. For instance, a two steps adaptive-like control scheme was proposed by Arecchi et al. [2, 11] which consists in: (1) extracting both unperturbed features of system dynamics and periods of the 21 It is worth mentioning again that the reach of such a neighborhood relies on the ergodic property of chaotic systems (see Appendix A). 22 For instance, by considering the application of a control signal on a selected system parameter when the trajectory visits an arbitrarily close neighborhood of the targeted orbit.
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
305
UPOs and (2) designing and applying adaptive perturbations to stabilize a selected UPO. Zhang et al. [71] investigated an adaptive control based on the Gaussian radial basis function networks23 [52]. Closer approaches to classical adaptive control theory were also proposed [16, 20, 23, 26, 27] to deal with unmodeled dynamics, unknown parameters, and disturbances. In this section, we consider an adaptive strategy as proposed in [16], which summarizes the essence of a basic Model Reference Adaptive Control (MRAC) scheme for chaotic systems. More precisely, consider the following two systems, where the first one represents the system to control and the second one is used as a reference model to characterize the expected dynamical behavior: x˙ (t) = f (x, t) + Bu(t), y˙ (t) = g(y, t),
y∈R
x ∈ Rn , u ∈ Rm , B ∈ Rn×m n
(6.14) (6.15)
The control problem is then to choose an appropriate (adaptive) control law u(t) such that, limt→∞ x(t) − y(t) = 0, where • is the Euclidean norm. With this aim, consider the (adaptive) control strategy proposed by Di Bernardo [16]. This strategy consists in first rewriting the control problem above in an appropriate form, so that standard control design approaches could be applied. This leads to the expression of the error dynamics as, e˙ (t) = x˙ (t) − y˙ (t) = f (x, t) − g(y, t) + Bu(t)
(6.16)
Now, assume that there exists an appropriate orthogonal projection operator : Rn → Im(B) [16], so that relation (6.16) can be rewritten as e˙ (t) = Le(t) + B h(x, t) − l(y, t) + u(t)
(6.17)
where Le(t) is the projection of f (x, t) − g(y, t) on the complementary space of Im(B), which is assumed to be linear, and h(x, t), l(y, t) are the projection on Im(B) of f (x, t) and g(y, t), respectively. By noting that relation (6.17) is of an appropriate form to deal with the design of a state feedback controllers, the problem can be expressed as finding a gain matrix K of appropriate dimension and such that L˜ = L − BK is Hurwitz. Then, exploiting the fact that the reference model trajectory is restricted to be a chaotic orbit, a limit cycle, or an equilibrium point (hence, its evolution is bounded), one can consider a control law of the form [16], −1 u(t) = −Ke(t) − k(t) [1 + φ(x)] BT Pe BT Pe 23A neural network approach.
(6.18)
0882-Perruquetti-ch06_R2_290705
306
Control of Chaotic and Hyperchaotic Systems
where P is the solution of the Lyapunov equation PL˜ + L˜ T P + I = 0, φ(x) is a positive definite, continuous function which defines an upper-bound of the nonlinearity of the system to control, and k(t) is adaptively estimated according to the law, ˙ = [1 + φ(x)] BT Pe k(t)
(6.19)
which guarantees that the error e(t) asymptotically converges towards zero (see the proof in Di Bernardo [16]). REMARK 1
Control law (6.18) consists of two different contributions: a linear feedback term and a discontinuous action whose magnitude is adaptively estimated. As pointed out earlier [39], the discontinuous action may induce an unfavorable chattering phenomenon. However, this problem vanishes if, in Equation (6.17), the linear matrix L is Hurwitz. Indeed, in such a case, the linear feedback term can be omitted, leading to a pure adaptive controller of the form, ˙ = BT Pe k(t) −1 (6.20) u(t) = −k(t) BT Pe BT Pe
6.2.5
Sliding Mode Control of Chaos
First, recall that conventional sliding mode control [62] requires at least: (1) a switching manifold that prescribed the desired dynamics and (2) a discontinuous control law such that the system trajectory first reaches the manifold and then stays on it forever. Within this context, as a preliminary approach, Vincent and Yu [65] investigated the use of a bang–bang controller to stabilize one of the unstable equilibrium points. This kind of control was also studied by Galias and Orgozalek [24] as a modification of the OGY method in case of assuming only two values for the control parameter. Later, Yu [68] introduced a sliding mode control strategy based on the switching-in of a two-value Lorenz system parameter. More recently, Yu et al. [70] emphasized the interest for the variable structure control approach, by proposing an extension of the OGY-type control method based on invariant manifold theory. Finally, it is worth mentioning the work of Yau et al. [64] who investigated sliding mode control for a class of chaotic systems with uncertainties. As main features, their control scheme: (1) guarantees asymptotic tracking of stable or unstable periodic orbits; (2) avoids the so-called “chattering effect”; and (3) does not require either the explicit use of a Poincaré map or the linearization about some specific point. This section deals with this last work, to apprehend some capabilities of sliding mode control methods to deal with chaotic systems (e.g., [33]).
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
307
For this purpose, consider the class of chaotic systems defined by x˙ i = xi+1 ,
1≤i ≤n−1
x˙ n = f (x, t) + f (x) + u
(6.21)
where x ∈ Rn is the state vector, u ∈ R is the control input, f is a given nonlinear C2 -function, and f (x) is a twice (continuously) differentiable uncertain term which represents the unmodeled dynamics and/or structural variations of the system. REMARK 2
The class under consideration consists of systems (with or without uncertainties) which can be expressed in a well-defined triangular form which ensures the so-called matching condition.24 For instance, such a class includes the Duffing–Holmes damped spring system, Van der Pol oscillator, etc. Moreover, assume that: A1. f (x, t) and f (x) satisfy all the necessary conditions such that system (6.21) has a unique solution in the time interval [t0 ; +∞), t0 > 0, for any given initial condition x0 = x (t0 ) A2. System (6.21), with u = 0, evolves in a chaotic motion In this context, the control problem can beformulated as finding a sliding mode control law u(t) such that: limt→∞ x(t) − x˜ (t) → 0, where • is the Euclidean norm and x˜ (t) denotes a targeted orbit. For this purpose, consider x˜ (t) as a solution of the unperturbed and uncontrolled system, x˙˜ i = x˜ i+1 ,
1≤i ≤n−1
x˙˜ n = f (˜x, t)
(6.22)
and let the tracking error be ej = xj − x˜ i , j = 1, 2, . . . , n, and g e, x˜ , t = f e + x˜ , t − f x˜ , t . Subtracting (6.22) from (6.21) leads to the characterization of error dynamics as, e˙i = ei+1 , 1 ≤ i ≤ n − 1 e˙n = g e, x˜ , t + f e + x˜ + u where g e, x˜ , t and f e + x˜ are assumed to be bounded.
(6.23)
24 So that the uncertainties can be compensated directly by means of the control law u(t).
0882-Perruquetti-ch06_R2_290705
308
Control of Chaotic and Hyperchaotic Systems
Then, that assuming u is differentiable and that first derivatives of both g e, x˜ , t and f e + x˜ are bounded, relation (6.23) can be rewritten, by the use of extended systems concept [21], as a standard system of the form: e˙i = ei+1 , 1 ≤ i ≤ n − 1 e˙n = g e, x˜ , t + f e + x˜ + u ≡ en+1 e˙n+1
d g e, x˜ , t + f e + x˜ + u˙ = dt
(6.24)
By noting that system (6.24) is of a (generalized) canonical controllable form [21] without any internal dynamics, and by considering the work of Chen and Lin [14], the (extended) sliding surface can then be defined by, s = en+1 − e0(n+1) +
t n+1 0 j=1
cj ej dt = 0
(6.25)
where e0(n+1) denotes the initial state of en+1 . Now, assuming that s = 0 and initial condition en+1 (0) = e0(n+1) , the sliding mode dynamics can then be described by the following set of equations, e˙i = ei+1 , e˙n+1 = −
n+1
1≤i≤n (6.26)
c j ej
j=1
for which the design parameters cj can be determined so that the characteristic polynomial P(e) = e˙n+1 +
n+1
cj e j
(6.27)
j=1
is Hurwitz. Then, according to [55], the reaching law can be chosen as, s˙ = −w sign(s)
(6.28)
where sign(·) denotes the sign function and the switching gain w > 0 has to be determined such that the sliding condition is satisfied and sliding mode motion will occur.
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
309
Finally, gathering relations (6.25), (6.26), and (6.28) leads to a control law u˙ of the form,25 d g e, x˜ , t + f e + x˜ − w sign(s) − c j ej dt n+1
u˙ = −
(6.29)
j=1
However, recall that the uncertainties f e + x˜ are assumed to be unknown (but upper bounded). Therefore (6.29) cannot be used directly for implementation. Instead, assuming the control to be robust enough to tackle some dynamics which are not directly compensated, (6.29) can be replaced by, d g e, x˜ , t − w sign(s) − c j ej dt n+1
u˙ = −
j=1
REMARK 3
Due to the control effect, on the sliding the error en tends towards manifold, zero and, therefore, both e˙n and g e, x˜ , t also converge to zero. Thus, the control law u(t) is always bounded. As shown by realistic simulation results [64], the sliding mode control appears to be suitable for chaos control purposes. In particular, robustness property of sliding mode controllers affords dealing with uncertain and/or perturbed chaotic systems, provided an upper bound of these uncertainties and/or disturbances is known. However, note that standard (i.e., first order) sliding mode control has some drawbacks such as the well-known chattering effect, which may lead to enforce the instability of the chaotic system (under control). Thus care should be taken in designing a sliding mode control law for such systems.
6.2.6
Energy-Based Sliding Mode Control of Chaos
As mentioned by Prigogine and Stengers [46], the more complex a system is, the more numerous are the perturbations, disturbances, or fluctuations that threaten its stability. As the system becomes more vulnerable to these disturbances, its energy requirement increases as it tries to maintain its structural properties. In contrast, any chaotic system can be considered as having its own limited energy source. Therefore, by controlling only one or several states, the system may be able to stabilize itself by using its own energy source. Such notions are interesting enough to motivate the
25 Recall that the first derivatives of both g e, x˜ , t and f e + x˜ are assumed to be bounded.
0882-Perruquetti-ch06_R2_290705
310
Control of Chaotic and Hyperchaotic Systems
consideration of the system energy for both designing control laws and taming chaos. Following this purpose, an energy-based control strategy for chaotic (possibly hyperchaotic) systems was proposed [37, 38]. This strategy mainly consists in a Variable Structure Control (VSC) approach which considers explicitly the system energy for both controller design and system stabilization. More precisely, with this strategy, the control objective is to regulate the system energy with respect to a shaped, nominal representation, implicitly related to system trajectories, robustness, and performance. From a more technical viewpoint, this control approach can be presented as follows. Let us consider the class of n-dimensional, nonlinear, autonomous systems of the form, x˙ = f (x) + u (6.30) y = h(x) where x ∈ Rn is the state vector, f is a vector-valued function, u ∈ Rn is the vector of control inputs, and y ∈ Rm is the output vector. Then, let us introduce some technical assumptions: A1. State vector x ∈ Rn can be partitioned as x = [x1T x2T ]T with x1 ∈ Rn−2 , x2 = [x21 x22 ]T ∈ R2 , and f (x) can be written as f (x) = [f1T (x1 , x2 ) f2T (x1 , x2 )]T with f1 (x1 , x2 ) ∈ C1 (Rn−2 ) and f2 (x1 , x2 ) ∈ C1 (R2 ) REMARK 4
The dimension of x2 is restricted here to a two-dimensional vector for the convenience of bifurcation analysis. A2. The system is at least locally observable and controllable. In addition, let us consider that the system energy can be represented by a Lyapunov function V which can be divided into two parts V1 and V2 (i.e., V = V1 + V2 ) related to scalar positive functions VT (x1 ) and VIS (x2 ), respectively. Moreover, assume that the positive functions VT (x1 ) and VIS (x2 ) have continuous first derivatives which can be expressed as: V˙ T = x˙ 1T 1 x1
(6.31)
V˙ IS = x˙ 2T 2 x2
(6.32)
where 1 ∈ Rn−2×n−2 and 2 ∈ R2×2 are diagonal matrices with strictly positive real values. Then, with respect to this context, the energy-based sliding mode control can be defined by the following result (see Laval and M’Sirdi [38] for the proof).
0882-Perruquetti-ch06_R2_290705
6.2
Chaos Control
311
LEMMA 1
Consider the following control structure, u = uTT
uTIS
T
(6.33)
with, uT = −1 sign (VT ) x1 − F 1 (x1 , x2 ) uIS =
∗ −2 sign(VIS − VIS )x2
− F 2 (0, x2 )
(6.34) (6.35)
where uT ∈ Rn−2×1 , uIS ∈ R2×1 , F 1 (x1 , x2 ), and F 2 (0, x2 ) are vectors of continuous functions which represent (local) equivalent system dynamics,26 1 ∈ Rn−2×n−2 and 2 ∈ R2×2 are diagonal matrices with strictly positive real values, ∗ is a positive constant which characterizes a desired magnitude of energy. and VIS Then: 1. All solutions of the controlled system (6.30) asymptotically reach a global invariant set IS included in the same subspace as x2 and defined by27 ∗ = 0. VIS − VIS ∗. 2. The energy of the controlled system converges to a neighborhood εIS of VIS
This result simply highlights that a representation of the system energy can be considered to define a sliding surface and, therefore that this energy can serve directly for stabilization purposes. Moreover, some technical remarks that need to be made are as follows: •
Control law (6.34) aims at driving the states of subvector x1 to converge toward 0. In the case of a positive definite function28 VT , (6.34) simply corresponds to a high-gain control law which guarantees the asymptotic convergence of x1 to zero, provided F 1 (x1 , x2 ) is upper bounded.
•
As the role of (6.35) is of major importance for the control, the closed-loop system behavior greatly depends on F 2 (0, x2 ). In particular, a suitable design of F 2 (0, x2 ) may afford the system trajectory to converge towards either a fixed point or a (quasi-)periodic orbit29 (see [38]).
26 Deduced from analysis of the actual system. 27 • : averaged value of •. 28 Such a condition can nevertheless be relaxed. 29 While keeping the system energy (quasi-)constant.
0882-Perruquetti-ch06_R2_290705
312
6.3
Control of Chaotic and Hyperchaotic Systems
Hyperchaos Control
According to the Rössler definition [50], hyperchaotic systems exhibit more than one positive Lyapunov exponent (i.e., their dynamics can expand in more than one direction). Therefore, such systems are more sensitive to perturbations, external disturbances, and parameter variations than basic chaotic ones, leading to some particular difficulties for the control. In contrast, hyperchaotic systems provide a great “richness” in UPOs. Thus, such systems are highly attractive for some application fields such as chaosbased encryption, secured communication, etc. provided an efficient and suitable control of their potential behaviors can be achieved. Obviously, many methods coming from the control theory framework are able to deal with hyperchaotic systems. However, such methods often yield to closed-loop dynamics, far from the intrinsic characteristics of the original systems. In other words, most of these methods deals with hyperchaotic systems as with any nonlinear systems, without directly exploiting both their richness and properties. In contrast, nonconventional control techniques derived from the OGY method have been proposed within the literature of the field. As a result, these methods aim at directly exploiting the chaotic properties of the systems, for stabilization purposes, while preserving, as much as possible, their original characteristics. This section aims at presenting some of these methods, to bring into the focus some particularities and fundamental problems occurring when dealing with the control of hyperchaotic systems. In particular, this section highlights a modified OGY method sometimes referred to as the YLM method, and an enhanced version of this latest one, based on the use of the so-called Adaptive Adjustment Mechanism (AAM) [29].
6.3.1 The YLM Method for Hyperchaos Control First, recall that OGY method aims at stabilizing an unstable orbit in the neighborhood of a hyperbolic fixed point by constraining the orbit to fall on the stable manifold. As the dynamics of hyperchaotic systems can expand in more than one direction, the basic OGY method then appears to be unsuitable to directly control such systems. The extended method proposed by Romeiras et al. [49] overcomes this problem, in part, with the use of a feedback matrix. However, this feedback control modifies the stability property of the fixed point by making this point to be fully stable after the parameter adjustment. To deal with a “highly” unstable fixed point,30 while keeping some features of the hyperchaotic system, Yang et al. [67] 30 Fixed point at which at least two eigenvalues of the Jacobian matrix have modulus greater than unity.
0882-Perruquetti-ch06_R2_290705
6.3
Hyperchaos Control
313
proposed a control strategy which mainly consists in stabilizing only one of the unstable directions by means of time-dependent adjustment of control parameters. From a technical viewpoint, this method can be presented as follows. First, note that the embedding theorem of Takens [59] asserts that if an orbit is in an attractor in the phase space, then the corresponding orbit in the embedding space is also in an attractor. Moreover, this theorem asserts that the two attractors have the same dimension. Then, with such assertions in mind, let us consider that the unstable orbit to be controlled is in an embedding space of dimension N, where N is a finite integer, and near a fixed point at which the dimension of the unstable manifold is Nu , with Nu ≤ N. Now, let us define a map T : ζn → ζn+1 such that, ζn+1 = F (ζn , ε)
(6.36)
where ζ ∈ RN is the dynamical variable, ε ∈ RNu is a parameter vector assumed to be accessible for external adjustment, and F (ζn , ε) is a continuously differentiable, vector-valued function of ζn with ε as parameter. In addition, let ζ∗0 be the fixed point of the map (6.36) with ε = 0. Then, the purpose is to slightly adjust the parameter ε to control an orbit of the map that runs away from the (unstable) fixed point if ε = 0. Moreover, following the same approach as for the OGY method, define the Jacobian matrix J of the map (with ε = 0) evaluated at the fixed point ζ∗0 : ∂F0 J= ∂ζn ζn =ζ∗0
(6.37)
where, for convenience, ζ∗0 is assumed to be the origin of the N-dimensional space. Then, the key point is that, according to the implicit function theorem, it can be asserted [67] that the map (6.36), with small parameters ε, has a fixed point, ζ∗ , in a neighborhood of ζ∗0 , provided the determinant of J is not equal to zero. In this case, for small ε values, one can consider that there exists a neighborhood W of ζ∗0 that is large enough to also include a neighborhood of ζ∗ , so that if ζn is in W then its image under the mapping (6.36) is also in W (see Figure 6.6). In this context, the control problem can be expressed as adjusting the parameter ε at each iteration so that ζn+1 becomes closer to ζ∗0 (located at the origin) than ζn (i.e., that ζn+1 = k ζn , where k is a constant and −1 < k < 1). In contrast to the OGY method which makes use of the stable submanifold to perform such convergence toward the fixed point, Yang et al. [67] proposed to drive the displacement of ζn on the Poincaré map surface by
0882-Perruquetti-ch06_R2_290705
314
Control of Chaotic and Hyperchaotic Systems
zn W
zn+1
z
z
0 *
*
FIGURE 6.6 Schematic representation of the YLM method.
means of a parameter adjustment of the form, εn = M−1 ( J − I)−1 ( J − kI ) ζn
(6.38)
where I is the N × N identity matrix and M is the following matrix, assumed to be nonsingular. M=
∂ζ∗ ∂ε ε=0
(6.39)
Such an adjustment of parameter ε, at each iteration, then leads the series {ζ1 , ζ2 , . . .} to converge monotonically toward the fixed point ζ∗0 , leading, finally, to the stabilization of the system. REMARKS This control strategy can deal with: •
Experimental applications for which a model of the system dynamics is not available, as matrices J and M can be defined experimentally [54]
•
High-dimensional chaotic systems, as the method has been expressed for N-dimensional systems (N being a finite integer)
•
Hyperchaotic systems with no pre-existing stable manifold
However, the YLM method is based on a parameter perturbations mechanism which requires at least one adjustable control parameter of the system to be found (and thus selected). Then, by adjusting this parameter, one of the unstable directions becomes stable so as to stabilize the whole unstable
0882-Perruquetti-ch06_R2_290705
6.3
Hyperchaos Control
315
orbit. However, in many experimental systems such as biological, chemical, or economical systems, the selection of such a parameter (a priori) is not trivial. To overcome this problem, Bu et al. [12] proposed a strategy based on an AAM [29], whose essence is discussed subsequently. 6.3.2
Enhanced YLM-Method with AAM
First, let us begin by presenting the Adaptive Adjustment Mechanism (AAM), as established by Huang [29]. 6.3.2.1 The AAM Mechanism Consider an n-dimensional nonlinear discrete system defined by x(k + 1) = F (x (k))
(6.40)
where x ∈ Rn is the state vector and F is a vector-valued function. Then, as proposed by Huang [29], the AAM considers a modified system of the form, ¯ (k)) = (1 − γ ) F(x (k)) + γ x (k) x (k + 1) = F(x
(6.41)
where γ is a positive control parameter referred to as an adaptive parameter. REMARK 5
According to (6.41), the AAM forces a feedback adjustment whenever any variable strays away from its previous state. The key point is that F and F¯ share some properties which can be stated as follows [29]. COROLLARY 1
Systems F and F¯ share exactly the same set of fixed points. Moreover, by considering the eigenvalues of the respective Jacobian matrices J¯ and J of both the original and modified systems evaluated at the same point, it can be seen that: COROLLARY 2
¯ there exists the following one-to-one For each and every fixed point of F and F, correspondence between their eigenvalues: λ¯ j = (1 − γ ) λj + γ
j = 1, 2, . . . , n
where λ¯ j and λj are the eigenvalues of J¯ and J, respectively.
0882-Perruquetti-ch06_R2_290705
316
Control of Chaotic and Hyperchaotic Systems
With such properties in mind, let us now consider the following result [29]. THEOREM 1
For an n-dimensional dynamical system defined by (6.40), supposing that x∗ is a fixed point of F and aj is the real part of the eigenvalues λj , for j = 1, 2, . . . , n then: Case 1: if aj < 1 for all j = 1, 2, . . . , n there exists a γ¯ such that, for all γ ∈ (γ¯ , 1), all respective modulus under the AAM can be reduced to a magnitude that is less than unity, and hence, the original unstable fixed point will be stabilized. Case 2: if aj > 1 for all j = 1, 2, . . . , n there exists a γ¯ such that, for all γ ∈ (1, γ¯ ), all respective modulus under the AAM can be reduced to a magnitude that is less than unity, and hence, the original unstable fixed point will be stabilized. Case 3: if some aj values are greater than unity, but others are less than unity, then the unstable fixed point cannot be stabilized by the simple AAM defined by (6.41).
The AAM provides a method to stabilize a broad class of multidimensional dynamical systems by considering one control parameter γ which depends on neither the structure of the original system nor any systems parameters. Then, with respect to these results, Bu et al. [12] investigated the problem of combining both the YLM method and the AAM, while retaining the interesting properties of each. From a technical viewpoint, in order to stabilize a fixed point xf of (6.40), their result considers, with analogy to Equation (6.41), the following control strategy, xk+1 = F(xk ) + M(F(xf ) − xk )
(6.42)
where M is an n × n matrix to be defined. For this purpose, consider a linear approximation of Equation (6.42) in a neighborhood W of the fixed point xf , δxk+1 ≈ Jxk + (M − J) δxk
(6.43)
where J = (∂F/∂xk )|xk =xT is the Jacobian matrix of the original system evaluated at the fixed point xf , I is the n × n identity matrix, and δxk = xk − xf is a small deviation of xk from xf . Now, to solve the control problem which consists in finding a control law such that limk→∞ δxk → 0, Bu et al. [12] suggested to consider a relation of the form, δxk = σ (k − k0 )δxk0
(6.44)
0882-Perruquetti-ch06_R2_290705
6.4
Conclusions
317
where δxk0 = xk0 − xf , xk0 ∈ W is the point from which the control is imposed on the original freely evolving system and σ (k) is a scalar function which satisfies σ (k) → 0 as k → ∞. Then, by assuming that ( J − I) is invertible, gathering (6.43) and (6.44) leads to define the matrix M as, M=
σ (k + 1) I − J ( J − I)−1 σ (k)
(6.45)
Finally, let us express some technical and concluding remarks: •
With respect to Equation (6.45), there exists multiple possibilities to define σ (k). For instance, as suggested earlier [12], σ (k) can be of the form: σ (k) = γ k where γ is a constant such that γ ∈ [−1, 1].
•
When compared with the YLM method, the AAM does not require a priori selection of a control parameter. Moreover, selecting of γ value (within the mentioned range) definitely determines the matrix M, which need not be changed afterwards with discrete time. Thus, in some senses, implementation of the control scheme can be quite straightforward.
•
Finally, when compared with the original AAM, this method can be applied to a larger class of fixed points than the one restricted to hyperbolic points (see Theorem 1, Case 3).
6.4
Conclusions
This chapter is aimed at introducing the interest in dealing with the control of chaotic and hyperchaotic systems. Then, several control methodologies (which are by no means the only existing ones), coming from either the control theory framework or other seminal approaches, were presented. We hope that this presentation will help the readers in understanding the basics of the field of chaos control, and in appreciating some of the existing methods.
0882-Perruquetti-ch06_R2_290705
318
Control of Chaotic and Hyperchaotic Systems
Acknowledgments The author wishes to thank Professor J.P. Barbot for his helpful remarks and the great attention he paid on this chapter. The author is also grateful to Dr. M. Djemai for helpful discussions. Finally, the author wishes to thank Professor N.K. M’Sirdi for having given his support to this work.
References 1. E.H. Abed, H.O. Wang, and R.C. Chen, Stabilization of period doubling bifurcations and implications for control of chaos, Physica D, 70, 154–164, 1994. 2. F.T. Arecchi, G. Basti, S. Boccaletti, and A.L. Perrone, Adaptive recognition of a chaotic dynamics, Europhys. Lett., 26, 327–332, 1994. 3. F.T. Arechi, S. Boccaletti, M. Ciofini, R. Meucci, and C. Grebogy, The control of chaos: theoretical schemes and experimental realizations, Int. J. Bifurcat. Chaos, 8 (8), 1643–1655, 1998. 4. P.J. Aston and C.M. Bird, Analysis of the control of chaos — extending the basin of attraction, Chaos Solitons Fract., 8, 1413–1429, 1997. 5. K. Aström and B. Wittenmark, Adaptive Control, 2nd ed., Addison-Wesley, 1995. 6. T. Basar and P. Bernhard, H∞ -Optimal Control and Related Minimax Design Problems — A Dynamic Game Approach, Systems and Control: Foundations and Applications, Birkhauser, 1991. 7. M. Basso, R. Genesio, and A. Tesi, Stabilizing periodic orbits of forced systems via generalized Pyragas controllers, IEEE Trans. Circ. Syst. I, 44, 1023–1027, 1997. 8. M. Basso, R. Genesio, and A. Tesi, Frequency domain methods and control of complex dynamics, in Proceedings of the IEEE Conference on Decision and Control, Florida, 1998, pp. 1936–1941. 9. S. Bhajekar, E.A., Jonckheere, and A. Hammad, H∞ control of chaos, in Proceedings of the 33rd Conference Decision Control, Lake Buena Vista, FL, 1994, pp. 3285–3286. 10. M.E. Bleich and J.E.S. Socolar, Stability of periodic orbits controlled by timedelay feedback, Phys. Lett. A, 210, 87–94, 1996. 11. S. Boccaletti and F.T. Arecchi, Adaptive control of chaos, Europhys. Lett., 31, 127–132, 1995. 12. S. Bu, S. Wang, and H. Ye, Control of hyperchaos, Phys. Rev. E, 64 (5), p. 056212, 2001. 13. G. Chen and X. Dong, From Order to Chaos: Methodologies, Perspectives and Applications, World Scientific, Singapore, 1998. 14. C.L. Chen and W.Y. Lin, Sliding mode control for nonlinear systems with global invariance, Proc. Inst. Mech. Eng., 211, 75–82, 1997. 15. G. Chin, L.R. Senesac, W.E. Blass, and J.J. Hillman, Stabilizing lead-salt diode lasers: understanding and controlling chaotic frequency emission, Science, 274, 1498, 1996.
0882-Perruquetti-ch06_R2_290705
References
319
16. M. Di Bernardo, An adaptive approach to the control and synchronization of continuous-time chaotic systems, Int. J. Bifurcat. Chaos, 6 (3), 557–568, 1996. 17. W.L. Ditto, S.N. Rauseo, and M.L. Spano, Experimental control of chaos, Phys. Rev. Lett., 65 (26), 3211–3214, 1990. 18. W.L. Ditto, M.L. Spano, and J.F. Lindner, Techniques for the control of chaos, Physica D, 86 (1–2), 198–211, 1995. 19. W.L. Ditto and T. Munakata, Principles and applications of chaotic systems, Commun. ACM, 38 (11), 96–102, 1995. 20. X. Dong, G. Chen, and L. Chen, Adaptive control of the uncertain Duffing oscillator, Int. J. Bifurcat. Chaos, 7 (7), 1651–1658, 1997. 21. M. Fliess, Generalized controller canonical forms for linear and nonlinear dynamics, IEEE Trans. Automat. Contr., AC-35, 994–1001, 1990. 22. A.L. Fradkov and J. Evans, Control of chaos: survey 1997–2000, in Proceedings of the 15th IFAC World Congress on Automatic Control, Barcelona, 2002, pp. 143–154. 23. A.L. Fradkov and A.Y. Pogromsky, Introduction to control of oscillations and chaos, World Sci. Ser. Nonlinear Sci., Ser. A, 35, 1998. 24. Z. Galias and M.J. Ogorzalek, Bang–bang control of chaotic systems, in Proceedings of the International Workshop on Nonlinear Dynamics of Electronics Systems, NDES’95, Dublin, 1995, pp. 229–232. 25. Z. Gills, C. Iwata, R. Roy, I.B. Swartz, and I. Triandaf, Tracking unstable steady states: extending the stability regime of a multimode laser system, Phys. Rev. Lett., 79, 3169–3172, 1992. 26. G.A. Gonzáles, Controlling chaos of an uncertain Lozi system via adaptive techniques, Int. J. Bifurcat. Chaos, 5, 559–562, 1994. 27. G.A. Gonzáles, M. Troparevsky, and C.E. D’Attellis, A remark on chaotic behavior in adaptive control systems, IEEE Trans. Automat. Contr., 39, 2145– 2148, 1994. 28. C. Grebogy and Y.C. Lai, Controlling chaos in high dimensions, IEEE Trans. Circ. Syst. I, 44, 971–975, 1997. 29. W. Huang, Stabilizing nonlinear dynamical systems by an adaptive adjustment mechanism, Phys. Rev. E, 61 (2), R1012–R1015, 2000. 30. A.W. Hübler, Adaptive control of chaotic systems, Helvetica Phys. Acta, 62, 343–346, 1989. 31. E.R. Hunt, Stabilizing high-periodic orbits in a chaotic system: the diode resonator, Phys. Rev. Lett., 67 (13), 1953–1955, 1991. 32. S. Iplikci and Y. Denizhan, Targeting in dissipative chaotic systems: a survey, Chaos, 12 (4), 995–1005, 2002. 33. M.J. Jang, C.L. Chen, and C.K. Chen, Sliding mode control of chaos in the cubic Chua’s circuit system, Int. J. of Bif. and Chaos, 12 (6), 1437–1449, 2002. 34. E.A. Jonckheere, A. Hammad, C.-Y. Cheng, and C.-C. Chien, LQ control of chaos, in Proceedings of the IFAC Symposium on Robust Control Design, 1994. 35. W. Just, T. Bernard, M. Ostheimer, E. Reibold, and H. Benner, Mechanism of time-delayed feedback control, Phys. Rev. Lett. A, 78, 203–206, 1997. 36. T. Kapitaniak, Controlling Chaos, Academic Press, New York, 1996. 37. L. Laval and N.K. M’Sirdi, Controlling chaotic and hyperchaotic systems via energy regulation, Chaos Solitons Fract., 15, 285–295, 2003. 38. L. Laval and N.K. M’Sirdi, On stabilizing n-dimensional chaotic systems, Int. J. Bifurcat. Chaos, 13 (2), 473–481, 2003.
0882-Perruquetti-ch06_R2_290705
320
Control of Chaotic and Hyperchaotic Systems
39. T.L. Liao and S.H. Lin, Adaptive control and synchronization of Chua’s circuit, Asian J. Contr., 1 (2), 75–87, 1999. 40. J.F. Lindner and W.L. Ditto, Removal suppression and control of chaos by nonlinear design, Appl. Mech. Rev., 48 (12), 795–807, 1995. 41. H. Nakajima and Y. Ueda, Limitation of generalized delayed feedback control, Physica D, 111, 143–150, 1998. 42. T.C. Newell, P.M. Alsing, A. Gavriedlides, and V. Kovanis, Synchronization of chaotic diode resonators by occasional proportional feedback, Phys. Rev. Lett., 72, 1647, 1994. 43. E. Ott, C. Grebogy, and J.A. Yorke, Controlling chaos, Phys. Rev. Lett., 64, 1196–1199, 1990. 44. N.H. Packard, J.P. Crutchfield, J.D. Farmer, and R.S. Shaw, Geometry from time series, Phys. Rev. Lett., 45, 712, 1980. 45. B. Peng, V. Petrov, and K. Showalter, Controlling chemical chaos, J. Phys. Chem., 95, 4957, 1991. 46. I. Prigogine and I. Stengers, Order Out of Chaos: Man’s New Dialogue with Nature, Bantam Books, New York, 1988. 47. K. Pyragas, Continuous control of chaos by self-controlling feedback, Phys. Lett. A, 170, 421–428, 1992. 48. K. Pyragas, Control of chaos via an unstable delayed feedback controller, Phys. Rev. Lett., 86 (11), 2265–2268, 2001. 49. F.J. Romeiras, C. Grebogy, E. Ott, and W.P. Dayawansa, Controlling chaotic dynamical systems, Physica D, 58, 165–192, 1992. 50. O.E. Rössler, An equation for hyperchaos, Phys. Lett., A71 (2–3), 155–157, 1979. 51. R. Roy, T.W. Murphy Jr., T.D. Mayer, Z. Gillis, and E.R. Hunt, Dynamical control of a chaotic laser: experimental stabilization of a globally coupled system, Phys. Rev. Lett., 68, 1259–1262, 1992. 52. R.M. Sanner and J.J. Slotine, Gaussian networks for direct adaptive control, IEEE Trans. Neural Networks, 3, 837–863, 1992. 53. T. Sauer and J.A. Yorke, How many delay coordinates do you need, Int. J. Bifurcat. Chaos, 3, 737, 1993. 54. T. Sauer and J.A. Yorke, Reconstructing the Jacobian from data with observational noise, Phys. Rev. Lett., 83, 1331–1334, 1999. 55. J.J. Slotine and W. Li, Applied Nonlinear Control, Prentice-Hall International Limited, London, 1991. 56. J.E.S. Socolar, D.W. Sukow, and D.J. Gauthier, Stabilizing unstable periodic orbits in fast dynamical systems, Phys. Rev. E, 50, 3245–3248, 1994. 57. T. Shinbrot, C. Grebogi, E. Ott, and J.A. Yorke, Using small perturbations to control chaos, Nature, Vol. 363, pp. 411–417, 1993. 58. S.H. Strogatz, Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry and Engineering, Addison-Wesley, 1994. 59. F. Takens, Detecting strange attractors in turbulence, in Lecture Notes in Mathematics, Dynamical Systems and Turbulence, Vol. 898, Springer, Berlin, 1981, pp. 366. 60. A. Tsonis, Chaos: From Theory to Applications, Plenum Press, New York, 1992. 61. T. Ushio, Limitation of delayed feedback control in nonlinear discrete-time systems, IEEE Trans Circ. Syst. I, 43, 815–816, 1996.
0882-Perruquetti-ch06_R2_290705
References
321
62. V.I. Utkin, Variable structure systems with sliding mode: a survey, IEEE Trans. Automat. Contr., ACC-22 (2), 212–222, 1977. 63. V.I. Utkin, Sliding Modes in Control and Optimization, Springer-Verlag, 1992. 64. H.T. Yau, , C.K. Chen, and C.L. Chen, Sliding mode control of chaotic systems with uncertainties, Int. J. Bifurcat. Chaos, 10 (5), 1139–1147, 2000. 65. T.L. Vincent and J. Yu, Control of a chaotic system, Dyn. Contr., 1, 35–52, 1991. 66. T.H. Yang, S.F. Chen, and Y.S. Gou, Efficient strategy for the occasionally proportional feedback method in controlling chaos, Phys. Rev. E, 59 (5), 5393–5399, 1999. 67. L. Yang, Z. Liu, and J-M Mao, Controlling hyperchaos, Phys. Rev. Lett., 84 (1), 60–70, 2000. 68. X. Yu, Controlling Lorenz chaos, Int. J. Syst. Sci., 27 (4), 355–359, 1996. 69. X. Yu, G. Chen, Y. Song, Z. Cao, and Y. Xia, A generalized method for controlling higher order chaotic systems, in Proceedings of the IEEE Conference on Decision Control, Sydney, Australia, 2000, pp. 2054–2059. 70. X. Yu, G. Chen, Y. Xia, Y. Song, and Z. Cao, An invariant-manifold-based method for chaos control, IEEE Trans. Circ. Syst. I: Fundam. Theory Appl., 48 (8), 930–937, 2001. 71. H. Zhang, H. Qin, and G. Chen, Adaptive control of chaotic systems with uncertainties, Int. J. Bifurcat. Chaos, 8 (10), 2041–2046, 1998. 72. K. Zhou, J.C. Doyle, and K. Glover, “Robust and Optimal Control”, PrenticeHall, 1995.
0882-Perruquetti-ch06_R2_290705
0882-Perruquetti-ch07_R2_290705
7 Polytopic Observers for Synchronization of Chaotic Maps
G. Millérioux and J. Daafouz
CONTENTS 7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.1 Chaotic Systems with Polytopic Description . . 7.2.1.1 Lur’e Systems . . . . . . . . . . . . . . . . . . 7.2.1.2 Output Injection with Time-Varying Dynamical Matrix . . . . . . . . . . . . . . . 7.2.1.3 Piecewise Linear Systems . . . . . . . . . . 7.2.2 Poly-Quadratic Stability . . . . . . . . . . . . . . . . . 7.3 Message-Free Chaos Synchronization . . . . . . . . . . . . 7.3.1 Synchronization and State Reconstruction . . . . 7.3.2 Polytopic Observers . . . . . . . . . . . . . . . . . . . . 7.3.3 Conditions of Global Synchronization . . . . . . . 7.4 Message-Embedded Chaos Synchronization . . . . . . . 7.4.1 Input Independent Global Synchronization . . . 7.4.2 Polytopic Unknown Input Observers . . . . . . . . 7.4.3 Conditions of IIGS . . . . . . . . . . . . . . . . . . . . . 7.4.4 Plaintext Recovering . . . . . . . . . . . . . . . . . . . . 7.5 Illustrative Examples . . . . . . . . . . . . . . . . . . . . . . . . . 7.5.1 Unknown Input Observer Design . . . . . . . . . . 7.5.2 Real-Time Private Communication Experiment 7.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
324 325 325 326
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
326 327 327 331 331 332 333 334 334 335 336 337 338 338 338 341 341
323
0882-Perruquetti-ch07_R2_290705
324
7.1
Polytopic Observers for Synchronization of Chaotic Maps
Introduction
The interest in chaos synchronization has increased in the last decade since the pioneering works by Pecora and Carroll [30, 31]. Message-free chaos synchronization has entered the control scene and has become a popular open problem from the control theory point of view [2]. Attempts [3] have been made to give a general formalism for synchronization in dynamical systems and many special issues devoted to the subject are of particular interest [38–41]. A wide variety of methods have been investigated to achieve synchronization of two dynamical systems coupled in a unidirectional way. A unidirectional coupling involves a system called response forced by an external signal emanating from a system called drive which exhibits a chaotic behavior. From the control theory point of view, three main suitable approaches are of interest. The first one consists of the reconstruction of the attractors from a sliding window of a finite amount of output measurements from the chaotic system [17, 36]. Such a method is motivated by the Takens’ theorem [42]. The second approach is referred to as controlled synchronization and consists of finding closed loop feedback control to ensure synchronization. This requires the measure of all the state variables of the system. Finally, when only partial information of these variables is available, meaning that only output variables of the drive are transmitted to the response, observer-based methods can be considered. One of the important surveys on chaos synchronization dealing with the observer approach is presented in Nijmeijer and Mareels [28]. For relatively recent results, the reader can refer to Huijberts et al. [16] for observers with linearizable dynamics, Pogromsky and Nijmeijer [32] for observers derived from the concept of absolute stability, Ramirez and Hernandez [37] for observers dedicated to systems having a generalized Hamiltonian forms, and Millerioux and Daafouz [23, 24] for observers of systems having polytopic description and whose design is based upon linear matrix inequalities (LMI). On the other hand, one of the well-known practical interests of chaos synchronization lies in the potential applications in communications, and more specifically in the possibilities of encoding or masking messages by suitable embedding. Indeed, it is reasonable to think that there is likely a connection between the random-look behaviors exhibited by chaotic systems and the required properties like confusion and diffusion of cryptosystems. Chaos-based encryption is currently an active field of research. A survey of chaos-based encryption schemes with an adequate bibliography incorporating some cryptographic skills has been discussed earlier [18, 19]. In Ref. [5, 29, 44], an overview of the techniques currently relevant for transmitting information via a chaotic signal is given. As far as terminology is concerned, in a message-embedded context, the system exhibiting
0882-Perruquetti-ch07_R2_290705
7.2
Preliminaries
325
chaos is commonly referred to as the transmitter, whereas the system which must extract the information is named the receiver. In this chapter, both message-free and message-embedded chaos synchronization problems are investigated over a unified framework which involves polytopic observers. Indeed, based upon the fact that the chaos generator named drive in the message-free context or transmitter in the message-embedded context exhibits a chaotic motion, its underlying state variables are constrained to a compact domain. As a consequence, the range and the bounds of those variables can be known such that the dynamical matrices can be expressed in a polytopic way. Then, the error of synchronization can also be written in a polytopic form. By using the notion of poly-quadratic stability [6, 7] and a parameter dependent Liapunov function (PDLF), the problem of the observer synthesis can be turned into the resolution of a LMI set. The benefits of such an approach rely on the fact that the resulting synchronization is global, and the computation of the gains of the observer is carried out in a systematic and tractable way. The layout of the chapter is the following. In Section 7.2, chaotic systems admitting a polytopic description are presented. Then, some background concerning the notion of poly-quadratic stability are presented. Section 7.3 and Section 7.4, respectively, deal with the message-free and the message-embedded chaos synchronization problem. A systematic procedure is stated for the design of the polytopic observers which must achieve global synchronization in the message-free context and additionally the recovering of the masked information in the message-embedded context. Notation Throughout this chapter, 1n is the n-dimensional identity matrix and 0n×m the n × m null matrix. For a matrix X, X T stands for its transpose. When symmetric, X > 0 indicates that X is positive definite. X † corresponds to the Moore–Penrose generalized inverse of X given by X † = (X T X)−1 X T .
7.2 7.2.1
Preliminaries Chaotic Systems with Polytopic Description
In this section, the class of chaotic systems under consideration is detailed. We concentrate on dynamical systems of which general description is as follows: xk+1 = A(ρk )xk + E(ρk ) (7.1) yk = Cxk
0882-Perruquetti-ch07_R2_290705
326
Polytopic Observers for Synchronization of Chaotic Maps
where xk ∈ Rn , yk ∈ Rm , A ∈ Rn×n , C ∈ Rm×n . Let ρ and ρ be, respectively, an L-dimensional and M-dimensional function. The images under ρ and ρ are, respectively, denoted ρk = (ρk1 , . . . , ρkL )T and ρk = (ρk1 , . . . , ρkM )T . They are both assumed to be available. The term A(ρk )xk includes all the affine dependence in the dynamics with respect to xk . Besides, A is of class C1 with respect to the entries of ρk such that A can be rewritten in the form A(ρk ) = A0 + Li=1 ρki Alc i . A0 is the matrix derived from A(ρk ) by keeping its constant entries while setting to zero its time-varying entries. Alc i is a matrix whose entries are all zero except the one, located at line l and column c, which equals unity. The superscripts l and c depend on i and correspond, respectively, to the position of ρki in A(ρk ). E is a (possible) nonlinear n-dimensional function depending on ρk (not necessarily in an affine way). The quantity ρk acts as a time-varying parameter for A and is assumed to be bounded such that A lies in a compact set which may be embedded in a polytope, that is: A(ρk ) =
N
ξki (ρk )Ai
(7.2)
i=1
The Ai ’s correspond to the vertices of the convex hull Co{A1 , . . . , AN } and i T the ξki ’s belong to the compact set S = {µk ∈ RN , µk = (µ1k , . . . , µN k ) , µk ≥ N i i 0 ∀i, and i=1 µk = 1}. The ξk ’s can always be expressed as a linear function of the ρki ’s. The class of systems described by (7.1) includes some usual chaotic systems. 7.2.1.1 Lur’e Systems These systems are described by the discrete model: xk+1 = A1 xk + E(yk ) A1 is a constant dynamical matrix and E is an n-dimensional function of the output yk . Such systems are derived from (7.1) by letting A(ρk ) = A1 and ρk = yk . Besides, note that a constant matrix A1 is a special case of (7.2) with N = 1. 7.2.1.2 Output Injection with Time-Varying Dynamical Matrix These systems are described by the recursion: xk+1 = A(yk )xk + E(yk ) Whenever such systems exhibit a chaotic behavior, xk and, therefore, yk are constrained to a compact domain. As a consequence, yk is bounded
0882-Perruquetti-ch07_R2_290705
7.2
Preliminaries
327
at least in a hypercube because each component yki ranges between two extremal values yi and yik . Hence, A(yk ) can be expressed in a polytopic way k and verifies (7.2) by letting ρk = ρk = g(yk ), g being a function of yk , such that A is of class C1 with respect to ρk . A polytopic decomposition for such systems is detailed in Ref. [24, 25]. 7.2.1.3
Piecewise Linear Systems
These systems are described by the recursion: xk+1 = Ai xk + Ei Let the state space Rn be partitioned into N distinct regions Ri , with i=N n i=1 Ri ⊆ R . Ai and Ei are constant matrices assigned, with a one-toone correspondence, to the region Ri , visited by xk at the discrete time k. Piecewise linear systems are derived from (7.1) as the following. Let ρ (resp. ρ ) be a scalar function Rn → I, with I = {1, . . . , N} an index set of N elements, defined by ρ(xk ) = ρk = i (resp. ρ (xk ) = ρk = i ), if xk visits the region Ri at the discrete time k. Let ρk = ρk and parameterizing A(ρk ) (resp. E(ρk )) such that A(ρk ) = Ai (resp. E(ρk ) = Ei ) when ρk = i, the usual piecewise linear description mentioned previously is thus obtained. Now, defining an indicator vector ξk = (ξk1 , . . . , ξkN )T as follows: ξki
=
1 if ρk = i 0 otherwise
Thus, A(ρk ) can be expressed in the polytopic form (7.2).
7.2.2
Poly-Quadratic Stability
Poly-quadratic stability has been introduced earlier [6] to state necessary and sufficient conditions of existence of PDLFs in the context of linear parameter varying systems (LPV). The notion of LPV systems was first introduced by Shamma and Athans [34]. This class of systems is different from standard linear time-varying systems counterpart because of the dependence of the system matrices on the variations of the plant dynamics. The study of LPV systems was first motivated by the gain scheduling control design methodology, where the design of the controller involves the design of several linear time invariant controllers for a parameterized family of linearized models of a system and the interpolation of the controller gains [33, 34]. Although it seems to be working well in practice, this heuristic design procedure does not take the parameter variations into account
0882-Perruquetti-ch07_R2_290705
328
Polytopic Observers for Synchronization of Chaotic Maps
and cannot provide any stability or performance guarantees, except for slow varying parameters [35]. Also, the LPV theory has been found useful to simplify the interpolation and realization problems associated with conventional gain scheduling. Specially, it allows to treat gain scheduling controllers as a single entity, with the gain scheduling achieved entirely by the parameter-dependent controller [43]. An LPV system is given by: νk+1 = A(ξk )νk
(7.3)
where νk is an n-dimensional state vector and ξk ∈ ⊂ RN is a bounded time-varying parameter. This system is referred as polytopic when the dependence of the dynamical matrix on ξk is given by: A(ξk ) =
N
ξki Ai ,
ξk =
ξk1 , . . . , ξkN
T
,
ξki
≥ 0,
i=1
N
ξki = 1
(7.4)
i=1
where Ai are constant matrices called vertices. What is known in the literature as quadratic stability refers to the checking stability of the previous system using classical quadratic Liapunov function V(νk ) = νkT Pνk , with P a positive definite matrix. Although any quadratic stability-based condition seems numerically useful because it generally leads to LMI feasibility problems [1], this kind of conditions is conservative. To reduce such a conservatism, PDLFs have been introduced [12]. This consists in letting the Liapunov matrix P depend on the parameter vector ξk . A general result is given in Theorem 1. THEOREM 1
System (7.3) is asymptotically stable if there exists a Liapunov function V(νk , ξk ) = νkT Pk (ξk )νk such that α1 (νk ) ≤ V(νk , ξk ) ≤ α2 (νk )
(7.5)
and whose difference along the solution of (7.3) is negative definite descrescent, that is L = V(νk+1 , ξk+1 ) − V(νk , ξk ) ≤ −α0 (νk )
(7.6)
for all νk ∈ Rn and ξk ∈ and where α0 (·), α1 (·), and α2 (·) are κ∞ functions.1 1 A function α: [0, ∞) → [0, ∞) is a κ function if it is continuous, strictly increasing, zero at ∞
zero, and unbounded (α(s) → ∞ as s → ∞).
0882-Perruquetti-ch07_R2_290705
7.2
Preliminaries
329
In practice, this result is very general and cannot be used in its present form because there is no systematic way to build the Liapunov function V(νk , ξk ) as a function of the time-varying parameter ξk . On the basis of a similar description of the LPV system (7.3), poly-quadratic stability has been defined in order to check stability of the polytopic LPV system (7.3), with a PDLF of the form: V(νk , ξk ) = νkT Pk νk
with Pk =
N
ξki Pi , ξki ≥ 0,
N
i=1
ξki = 1
(7.7)
i=1
where Pi are symmetric positive definite constant matrices of appropriate a PDLF satisfies Condition (7.5) with α2 (νk ) = N dimension. Such 2 2 i=1 λmax (Pi )νk and α1 (νk ) = ενk , with ε a sufficiently small positive scalar. It’s difference along the solution of (7.3) is given by L = V(νk+1 , ξk+1 ) − V(νk , ξk )
(7.8)
with V(νk+1 , ξk+1 ) =
T νk+1 Pk+1 νk+1 ,
Pk+1 =
N
i ξk+1 Pi
(7.9)
i=1
A necessary and sufficient condition of existence of such a PDLF is proposed in [6]. It consists in checking the feasibility of a set of LMI in which the unkowns are directly related to the Liapunov matrices Pi . This condition allows to answer either “yes” or “no” to the following question: Is there a Liapunov function of the form (7.7) allowing to check that the LPV system (7.3) is globally asymptotically stable. Before stating this result, a definition of poly-quadratic stability is recalled from Ref. [6]. DEFINITION 1 System (7.3) is said to be poly-quadratically stable, if there exists a positive definite and quadratic PDLF V as defined in (7.7) whose difference along the solution of (7.3) satisfies
V(νk+1 , ξk+1 ) − V(νk , ξk ) = νkT (AT Pk+1 A − Pk )νk < −α0 (νk )
(7.10)
with α0 a κ∞ function. The following theorem gives a necessary and sufficient condition for the dynamics (7.3) to be poly-quadratically stable and so for νk to converge globally toward zero.
0882-Perruquetti-ch07_R2_290705
330
Polytopic Observers for Synchronization of Chaotic Maps
THEOREM 2
The LPV system (7.3) is poly-quadratically stable if and only if there exist N positive symmetric matrices P1 , . . . , PN and N matrices G1 , . . . , GN satisfying the following set of LMI:
Pi
ATi GiT
Gi Ai
Gi + GiT − Pj
>0
(7.11)
for all (i, j) ∈ {1, . . . , N} × {1, . . . , N}. The Liapunov function is then given by V(νk , ξk ) = νkT
N
ξki Pi νk
i=1
The main advantage in using poly-quadratic stability to answer the basic problem stated in the beginning of this section relies on the fact that it provides a sufficient condition of asymptotic stability with the following features: •
This condition is numerically well tractable. One has to check the feasibility of a set of LMI. This reduces to a convex optimization problem for which powerful numerical algorithms and routines are known to exist.
•
It is obviously less conservative than the conditions based on checking the existence of a common Liapunov function.
•
This condition can be used for switched linear systems as explained in Daafouz et al. [8]. When compared with some existing conditions for stability of switched linear systems which require that the matrices Ai commute for each i, the conservatism is reduced.
•
Under the arbitrary switching rule, the proposed condition has to be satisfied for all the pairs (i, j), that is, to take into account all possible switches from each subsystem to another. However, if all the transitions are not allowed and if one is able to determine a set of all ordered pairs (i, j) of indices denoting the possible switches from a subsystem Ai to another subsystem Aj , the proposed condition can be modified to take into account only these selected pairs of indices. Hence, knowledge of allowed transitions between subsystems is a way to reduce again the conservatism in the case of switched linear systems.
•
The extra matrices Gi can be useful when design problems are formulated using this condition. The control or observer gains will depend on this matrices and not on the “Liapunov” matrices. Hence, if other constraints than stability are fixed, they will not affect the Liapunov
0882-Perruquetti-ch07_R2_290705
7.3
Message-Free Chaos Synchronization
331
matrices but only these extra matrices [26]. This can be less conservative than the results where the control or the observer gains depend explicitly on the Liapunov matrices (see also Daafouz et al. [9] where the switched static output feedback problem is presented as an example of this situation). In the following sections, the problems of message-free and messageembedded chaos synchronization are discussed. A motivation of the observer-based approach developed in both cases is previously given.
7.3 7.3.1
Message-Free Chaos Synchronization Synchronization and State Reconstruction
Observer-based synchronization is one of the possible methods which enables the dynamical system state reconstruction. It is well known that for a single input–single output autonomous linear dynamical system of dimension n, a brute method, in view of reconstructing the state vector xk at the discrete time k, consists in simply inverting a so-called observability matrix Q0 . It stems from the fact that, for a realization (A, C), xk can be expressed as a linear combination of the n past outputs yk−i , where i = 0, . . . , n − 1 in the form: C .. T xk = An−1 Q−1 and Yk = [yk−n+1 , . . . , yk ] . 0 Yk with Q0 = CAn−1 provided that Q0 is invertible or equivalently that the pair (A, C) is observable. A state reconstruction based on past outputs has a counterpart for nonlinear systems given by the Taken’s theorem [42]. THEOREM 3
Let be a compact manifold of dimension n. Let ϕ be a smooth (at least of class C2 ) diffeomorphism Rn → Rn and h a smooth function Rn → R. Generically, there exists a map φ from Rn to Rl+1 such that: φ(xk ) = (h(xk ), . . . , h(ϕ l (xk ))) for l ≥ 2n. Applying such a theorem would enable to reconstruct the state vector xk of a chaotic map from at least the 2n + 1 past output values. Unfortunately,
0882-Perruquetti-ch07_R2_290705
332
Polytopic Observers for Synchronization of Chaotic Maps
Taken’s theorem does not provide the function φ. Besides, it is well known that a direct reconstruction, or equivalently a direct “inversion,” suffers from measurement errors and is not viable in practice. It is better to use asymptotical reconstruction, an approach which motivates the use of observers. The issue of direct reconstruction has been discussed earlier [15, 17, 36]. Before dealing with polytopic observers, a definition of synchronization is presented. DEFINITION 2 Global synchronization of a drive–response system can be expressed in one of the following formulations involving the respective state vectors xk and xˆ k :
lim xk − xˆ k = 0
k→∞
∃kf ,
xk − xˆ k = 0
∀ˆx0
(7.12)
∀ˆx0 and ∀k > kf
(7.13)
Equation (7.12) corresponds to an asymptotical synchronization, whereas Equation (7.13) corresponds to a finite time synchronization.
7.3.2
Polytopic Observers
Consider a response system governed by the dynamics of the following observer named polytopic observer: xˆ k+1 = A(ρk )ˆxk + E(ρk ) + L(ρk )(yk − yˆ k ) (7.14) yˆ k = Cxˆ k The equation of the synchronization error between the drive and the response is obtained by subtracting (7.14) from (7.1). εk+1 = (A(ρk ) − L(ρk )C)εk
(7.15)
It is recalled that A(ρk ) is written in a polytopic form (7.2) as described in Section 7.2.1. Let us define L(ρk ) as a time-varying gain matrix depending on ρk and satisfying the relation: L(ρk ) =
N
ξki (ρk )Li
(7.16)
i=1
The terms ξki are the ones involved in the polytopic decomposition (7.2) of A(ρk ) and so depend on ρk . Equation (7.16) means that the gain matrix
0882-Perruquetti-ch07_R2_290705
7.4
Message-Embedded Chaos Synchronization
333
L(ρk ) is interpolated from the vertices Li . They have to be computed in order to ensure global synchronization. From this perspective, substituting (7.2) and (7.16) into (7.15) yields: εk+1 =
N
ξki (Ai − Li C)εk
(7.17)
i=1
This is a polytopic formulation of the error of synchronization. Section 7.3.3 is devoted to conditions for global convergence conditions of (7.17) and so global synchronization of (7.1)–(7.14). They are based upon the notion of poly-quadratic stability presented in Section 7.2.2.
7.3.3
Conditions of Global Synchronization
PROPOSITION 1
Global synchronization of (7.1)–(7.14) is achieved whenever the feasibility condition of the following set of LMI is satisfied:
Pi
ATi GiT − CT FiT
Gi Ai − F i C
Gi + GiT − Pj
>0
(7.18)
for all (i, j) ∈ {1, . . . , N} × {1, . . . , N}. The Gi ’s, Pi ’s, and Fi ’s are unknown matrices of appropriate dimensions. The resulting gains Li are given by Li = Gi−1 Fi . REMARK 1
The formulation (7.19) differs from the one encountered in [7] but is strictly equivalent.
7.4 7.4.1
Message-Embedded Chaos Synchronization Input Independent Global Synchronization
We concentrate on the message-embedded scheme depicted in Figure 7.1. The plaintext mk is encrypted by an encryption function e which depends on a chaotic key stream xk generated by the chaos generator named in this context the transmitter. The resulting quantity denoted uk is embedded in the dynamics of the chaos generator. In the sequel, uk will be abusively
0882-Perruquetti-ch07_R2_290705
334
Polytopic Observers for Synchronization of Chaotic Maps
called the information. It is important to note that uk is not transmitted to the receiver, only an output signal yk , whose dimension is less than the dimension of xk , is transmitted through the channel to the receiver. The receiver system must be designed such that uk can be recovered, given the only available data yk . Once uk is recovered, the plaintext mk can be extracted by applying the decoding function e−1 , provided that xˆ k is exactly synchronized with xk . This requirement is the main problem to be overcome. Few methods involving observer-based approaches have been investigated. The design of the observer is based on the consideration of the state reconstruction error dynamics. On one hand, the design can be carried such that its convergence toward zero is guaranteed despite of the presence in the dynamics of a residual term involving uk . A sufficient condition for the exponential convergence of the state-error dynamics in the case of Lipschitz nonlinearities is given in Ref. [21]. For discrete-time systems, dead-beat observers can be designed to make the matrix involved in the synchronization error equation to be nilpotent [11, 22]. In this case, despite the fact that the error depends on uk , it can reach zero after a finite number of steps. This method works, for example, by performing a zero eigenvalues assignment with discrete-time Lur’e chaotic systems. On the other hand, the design can be performed in such a way that the residual term involving uk no longer appears in the state reconstruction error dynamics. An example is presented in the context of a chaotic inverse system encryption approach with Lur’e systems [46]. The problem has been formally tackled by introducing the notion of input independent global synchronization (IIGS) [26, 27]. In Ref. [27], an unknown input observer approach dedicated to polytopic systems has been established. Such an approach is recalled here.
uk mk
e−1(xˆ k,uˆ k)
e(xk, mk) xk transmitter
FIGURE 7.1 Message-embedded scheme.
xˆ k
yk
receiver
ˆ m k uˆ k
0882-Perruquetti-ch07_R2_290705
7.4
Message-Embedded Chaos Synchronization
335
IIGS of a transmitter–receiver system can be expressed in one of the following formulations involving the respective state vectors xk and xˆ k : DEFINITION 3
lim xk − xˆ k = 0
∀ˆx0 , uk
k→∞
∃kf ,
xk − xˆ k = 0
∀ˆx0 ,
∀k > kf and ∀uk
(7.19) (7.20)
Equation (7.20) and Equation (7.21) differ from Definition 2 by the fact that xˆ k must coincide with xk given any uk .
7.4.2
Polytopic Unknown Input Observers
To achieve an IIGS, an unknown input observer approach is presented. Unknown input observers have been largely investigated for linear systems [4, 10, 13, 45] or bilinear systems [20]. Extension of such a structure for systems having a polytopic description is presented [27]. Let us consider the transmitter described by:
xk+1 = A(ρk )xk + E(ρk ) + Buk yk = Cxk
(7.21)
which differs from (7.1) by the introduction of an additional term Buk involving a so-called “mixing matrix” B ∈ Rn×r (r ≥ m) and uk ∈ Rr . As previously described in Section 7.4.1, the term uk results from an encoding function e such that uk = e(xk , mk ). It is assumed that e admits an inverse decoding function e−1 such that mk = e−1 (xk , uk ). As far as the receiver part is concerned, a natural extension of the linear unknown input observer structure is proposed: xˆ k+1 = (PA(ρk ) − L(ρk )C)ˆxk + PE(ρk ) + L(ρk )yk + Qyk+1
(7.22)
i with P = 1n − QC and L(ρk ) = N i=1 ξk (ρk )Li . The gains Q and Li ’s (i = 1, . . . , N) must be computed to achieve an IIGS of (7.22) and (7.23) and, consequently, the global convergence of the state reconstruction error εk . Its dynamics is obtained by subtracting (7.23) from (7.22) and taking into account the polytopic expression of L(ρk ) and A(ρk ): εk+1 =
N i=1
ξki (PAi − Li C)εk + PBuk
(7.23)
0882-Perruquetti-ch07_R2_290705
336 7.4.3
Polytopic Observers for Synchronization of Chaotic Maps Conditions of IIGS
To ensure the global convergence of (7.24) towards zero for any uk , not only the term PB has to vanish (input independence) but also the resulting dynamical equation must converge towards zero (global convergence). PROPOSITION 2
The state reconstruction error Equation (7.24) can be made input independent whenever rank(CB) = rank(B) = r. Indeed, according to the definition of P, the equality PB = 0 entails that Q must be subject to: B = QCB
(7.24)
Proposition 2 ensures the existence of the solution Q of (7.25) and its general expression is: Q = B(CB)† + Y(1m − (CB)(CB)† )
(7.25)
with Y an arbitrary matrix. Then, whenever Q satisfies (7.26), PB = 0 and so (7.24) turns into an input independent dynamics: εk+1 =
N
ξki (PAi − Li C)εk
(7.26)
i=1
This is a polytopic formulation of the error of synchronization. On the basis of the same reasoning as in Section 7.3.3, the following theorem can thereby be stated: THEOREM 4
IIGS of the message-embedded scheme (7.22) and (7.23) is achieved whenever the following conditions are satisfied: 1. rank(CB) = rank(B) = r 2. the set of LMIs:
Pi
(PAi )T GiT − CT FiT
Gi (PAi ) − Fi C
Gi + GiT − Pj
is feasible for all (i, j) ∈ {1, . . . , N} × {1, . . . , N}
>0
(7.27)
0882-Perruquetti-ch07_R2_290705
7.4
Message-Embedded Chaos Synchronization
337
The Gi ’s, Pi ’s, and Fi ’s are unknown matrices of appropriate dimensions. The resulting gains Li are given by Li = Gi−1 Fi . PROOF (CB)† to
7.4.4
See Ref. [27]. Let us just mention that the rank Condition 1 ensures exist in (7.26), and so PB = 0 to be satisfied.
Plaintext Recovering
The remaining problem lies in the plaintext mk recovering. Proposition 2 provides the conditions and a way to recover the original plaintext mk . PROPOSITION 3
ˆ k+1 = mk , where dˆ k and If (7.22) and (7.23) are IIGS, one has dˆ k+1 = uk and m ˆ k obey the following recursions: m dˆ k+1 = (CB)† (yk+1 − CA(ρk )ˆxk − CE(ρk ))
(7.29a)
ˆ k+1 = e−1 (ˆxk , dˆ k+1 ) m
(7.29b)
On one hand, if (7.22) and (7.23) are IIGS, then xˆ k = xk . Furthermore, premultiply the dynamical equation of (7.22) by C, then multiply the left-hand side by (CB)† (whose existence is ensured by the rank Condition 1) of Theorem 4 yields:
PROOF
uk = (CB)† (yk+1 − CA(ρk )xk − CE(ρk ))
(7.30)
Identifying (7.30) and (7.29a) yields dˆ k+1 = uk . On the other hand, if (7.22) and (7.23) are IIGS, then the equality xˆ k = xk still holds. Furthermore, xˆ k = xk and dˆ k+1 = uk turn the equality mk = e−1 (xk , uk ) (derived from the definition of e) into mk = e−1 (ˆxk , dˆ k+1 ). ˆ k+1 = mk . This completes the Identifying this equality with (7.29b) yields m proof. ˆ k+1 = mk necessarily leads to a delay when attemptLet us note that m ing to recover mk . It stems from the fact that (7.22) has a relative degree equalling one with respect to uk .
0882-Perruquetti-ch07_R2_290705
338
7.5 7.5.1
Polytopic Observers for Synchronization of Chaotic Maps
Illustrative Examples Unknown Input Observer Design
An experiment of a message-embedded chaos synchronization scheme involving a transmitter of the form (7.22) is conducted. The distinct matrices of the dynamics are: 1 0 ρk 0 1 , B = [0.1 A(ρk ) = 1 −0.7 0 0.01 −1 0 0 C= , E = 03×1 0 0 1
1
1]T ,
The nonlinear time-varying parameter ρk verifies ρk = xk1 xk3 , xki being the ith component of the state vector xk . Note that the special choice of the output matrix C causes ρk to be available at each discrete time k as required. The map exhibits a chaotic motion which entails that ρk is bounded. Simulation shows that ρk ranges between ρ = 0.5627 and ρ = 0.8028. Consequently, A lies in a compact set which may be embedded in a polytope and may be expressed in the form of (7.2). The corresponding vertices are given by:
0.5627 A1 = 1 −0.7
1 0 0
0 1 , 0.01
0.8028 A2 = 1 −0.7
1 0 0
0 1 0.01
A one-dimensional information mk (the plaintext) is embedded in the chaotic motion through uk which results from an invertible coding function e. The plaintext consists of a sampled sine wave mk = Mm sin(2π k f˜ ), with f˜ = 0.08. To first recover uk , the receiver is designed according to (7.23) and the Theorem 4. The gain Q is computed from (7.26) with a null arbitrary matrix Y. The gains Li are computed from (7.28) using a standard LMI solver. Finally, the plaintext mk is recovered by applying (7.29). Simulation results are presented in Figure 7.2 and highlight the consistence of the theoretical developments.
7.5.2
Real-Time Private Communication Experiment
A chaotic encryption experiment is conducted within a real-time video communication context. For that purpose, a well-known GNU licensed program for video transmission over the Internet, VIC, has been chosen.
0882-Perruquetti-ch07_R2_290705
7.5
Illustrative Examples
339 (b)
(a) 0.4
0.5
0.2 0 0 −0.5 −0.2
−0.4
2
4
6
8
−1
10
(c)
(d)
1.5
1
0.5
0.5
0
0
−0.5
−0.5
−1
−1 20
40
60
80
100
4
6
8
10
60
80
100
1.5
1
−1.5
2
−1.5
20
40
FIGURE 7.2 ˆ k , (c) plaintext mk , and (d) recovered plaintext m ˆ k. (a) Error xk − xˆ k , (b) error mk − m
A video tape is connected to a computer through the S-Video port of a Miro Studio PCTV RaveTM card. Consequently, the video tape data are dynamically captured by the TV-card and VIC manages the transmission protocol over the Internet. The card has been configured to work under Linux and is driven by the bttv and video4linux drivers included in the VIC package. VIC’s default package contains an implementation of DES cryptographic algorithm. However, it also allows to introduce new cryptographic schemes. The encrypting scheme corresponding to the message-embedded framework developed in Section 7.4 has been introduced. The well-known second-order Markov piecewise linear map has been considered as the chaos generator. It induces a chaotic behavior which is reckoned to get some good statistical properties for encryption purposes. Here, the key is the parameterization of the chaotic map. The design of the transmitter–receiver obeys the Equation (7.22), Equation (7.23), and Theorem 4. With the same key in both sides, the video is correctly displayed in the receiver side. Using slightly different key parameters on both sides of the communication system, the image is badly decrypted, which highlights the sensitivity of the algorithm to key parameters. Two capture screens are shown in Figure 7.3.
0882-Perruquetti-ch07_R2_290705
340
Polytopic Observers for Synchronization of Chaotic Maps
FIGURE 7.3 Decoder capture screens: matched and mismatched keys.
0882-Perruquetti-ch07_R2_290705
References
7.6
341
Conclusion
Chaos synchronization has been tackled by considering the problem as a special case of an observer design. The general class of considered dynamical systems includes, in particular, Lur’e systems, piecewise linear systems, and output injection with time-varying dynamical matrix. Both messagefree and message-embedded synchronization issues have been treated. Owing to the chaotic motions-specific properties of keeping the underlying state variables in a compact domain, the dynamics can be written in a polytopic form. Hence, the synchronization can be carried out by designing, respectively, a polytopic observer or an unknown polytopic observer. Global synchronization is ensured by a special Liapunov approach. The Liapunov function is a PDLF called poly-quadratic, with a structure similar to that of the polytopic system description. The gains of the observer are computed by a systematic procedure involving the solutions of an LMI set.
References 1. G. Becker, Additional results on parameter-dependent controllers for lpv systems, in Proceedings of the IFAC World Congress, San Fransisco, 1996. 2. V.D. Blondel, E.D. Sontag, M. Vidyasagar, and J.C. Willems, Open problems in mathematical systems and control theory, Communication and Control Engineering. Springer Verlag, 1999. 3. I.I. Blekhman, A.L. Fradkov, H. Nijmeijer, and A.Y. Pogromsky, On selfsynchronization and controlled synchronization, Syst. Contr. Lett., 31 (5), 299–305, 1997. 4. S.-K. Chang, W.-T. You, and P.-L. Hsu, Design of general structured observers for linear systems with unknown inputs, J. Franklin Inst., 334 (2), 213–232, 1997. 5. Chen, Ed., Controlling Chaos and Bifurcations in Engineering Systems, CRC Press, 1999. 6. J. Daafouz and J. Bernussou, Parameter dependent Lyapunov functions for discrete time systems with time varying parametric uncertainties, Syst. Contr. Lett., 43, 355–359, 2001. 7. J. Daafouz and G. Millerioux, Poly-quadratic stability and global chaos synchronization of discrete time hybrid systems, Special Issue of Mathematics and Computers in Simulation, 58, 295–307, 2002. 8. J. Daafouz, G. Millerioux, and C. Iung, A poly-quadratic stability based approach for switched systems, Int. J. Contr., 75, 1302–1310, 2002. 9. J. Daafouz, P. Riedinger, and C. Iung, Stability analysis and control synthesis for switched systems: a switched Lyapunov approach, IEEE Trans. Automatic. Contr., 2002.
0882-Perruquetti-ch07_R2_290705
342
Polytopic Observers for Synchronization of Chaotic Maps
10. M. Darouach, M. Zazadinski, and S.J. Xu, Full-order observers for linear systems with unknown inputs, IEEE Trans. Automat. Contr., 39 (3), 606–609, 1994. 11. A. De Angeli, R. Genesio, and A. Tesi, Dead-beat chaos synchronization in discrete-time systems, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 42 (1), 54–56, 1995. 12. P. Gahinet, P. Apkarian, and M. Chilali, Affine parameter dependent Lyapunov functions and real parametric uncertainty, IEEE Trans. Automat. Contr., 41, 436–442, 1996. 13. Y. Guan and M. Saif, A novel approach to the design of unknown input observers, IEEE Trans. Automat. Contr., 36 (5), 632–635, 1991. 14. M. Hasler, Synchronization of chaotic systems and transmission of information, Int. J. Bifurcat. Chaos, 8 (4), 1998. 15. H.J.C. Huijberts and H. Nijmeijer, An observer view on synchronization, in A. Isidori, F. Lamnabhi-Laguarrigue, and W. Respondek, Eds., Nonlinear Control in the year 2000, Springer Verlag, 2000, pp. 509–520. 16. H.J.C. Huijberts, T. Lilge, and H. Nijmeijer, Nonlinear discrete-time synchronization via extended observers, Int. J. Bifurcat. Chaos, 11 (7), 1997–2006, 2001. 17. M. Itoh, C.W. Wu, and L.O. Chua, Communications systems via chaotic signals from a reconstruction viewpoint, Int. J. Bifurcat. Chaos, 7 (2), 275–286, 1997. 18. G. Jakimoski and L. Kocarev, Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 48 (2), 163–169, 2001. 19. L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circ. Syst. Mag., 1 (3), 6–21, 2001. 20. S.H. Lee, J. Kong, and J.H. Seo, Observers for bilinear systems with unknown inputs and application to superheater temperature control, Contr. Eng. Pract., 5 (4), 493–506, 1997. 21. T.-L. Liao and N.-S. Huang, An observer-based approach for chaotic synchronization with applications to secure communications, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 46 (9), 1144–1150, 1999. 22. K.-Y. Lian, T.-S. Chiang, and P. Liu, Discrete-time chaotic systems: applications in secure communications, Int. J. Bifurcat. Chaos, 10 (9), 2193–2206, 2000. 23. G. Millerioux and J. Daafouz, Global chaos synchronization and robust filtering in noisy context, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 48 (10), 1170–1176, 2001. 24. G. Millerioux and J. Daafouz, Polytopic observer for global synchronization of systems with output measurable nonlinearities, Int. J. Bifurcat. Chaos, 13 (3), 703–712, 2003. 25. G. Millerioux, F. Amstett, and G. Bloch, Considering the attractor structure of chaotic maps for observer-based synchronization problems, Mathematics and Computers in Simulation, 68 (1), 67–85, 2005. 26. G. Millerioux and J. Daafouz, An observer-based approach for input independent global chaos synchronization of discrete-time switched systems, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 50 (10), 1270–1279, 2003.
0882-Perruquetti-ch07_R2_290705
References
343
27. G. Millerioux and J. Daafouz, Unknown input observers for messageembedded chaos synchronization of discrete-time systems, Int. J. Bifurcat. Chaos, 14 (4), 1357–1368, 2004. 28. H. Nijmeijer and I.M.Y. Mareels, An observer looks at synchronization, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 44, 882–890, 1997. 29. M.J. Ogorzalek, Taming chaos — part I: synchronization, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 40 (10), 693–699, 1993. 30. L.M. Pecora and T.L. Carroll, Synchronization in chaotic systems, Phys. Rev. Lett., 64, 821–824, 1990. 31. L.M. Pecora and T.L. Carroll, Driving systems with chaotic signals, Phys. Rev. A, 44 (8), 2374–2383, 1991. 32. A. Pogromsky and H. Nijmeijer, Observer-based robust synchronization of dynamical systems, Int. J. Bifurcat. Chaos, 8 (11), 2243–2254, 1998. 33. W.J. Rugh, Analytical framework for gain scheduling, IEEE Contr. Syst. Mag., 11 (1), 74–84, 1991. 34. J.S. Shamma and M. Athans, Analysis of gain scheduled control for nonlinear plants, IEEE Trans. Automat. Contr., 35, 898–907, 1990. 35. J.S. Shamma and M. Athans, Guaranteed properties of gain scheduled control for linear parameter varying plants, Automatica, 27, 559–564, 1991. 36. H. Sira Ramirez, C.A. Ibanez, and Suarez-castanon, Exact state reconstructors in the recovery of messages encrypted by the states of nonlinear discrete-time chaotic systems, Int. J. Bifurcat. Chaos, 12 (1), 169–177, 2002. 37. H. Sira Ramirez and C. Cruz Hernandez, Synchronization of chaotic systems: a generalized hamiltonian approach, Int. J. Bifurcat. Chaos, 11 (5), 1381–1395, 2001. 38. Special Issue, Control of chaos and synchronization, Syst. Contr. Lett., 31, 259–322, 1997. 39. Special Issue, Chaos synchronization and control: theory and applications, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 40, 853–1039, 1997. 40. Special Issue, Control and synchronization of chaos, Int. J. Bifurcat. Chaos, 10 (4), 2000. 41. Special Issue, Control of oscillations and chaos, Special Issue Math. Comput. Simulat., 58, 283–505, 2002. 42. Takens F, Detecting strange attractors in fluid turbulence, in D. Rand and L.S. Young, Eds., Dynamical Systems and Turbulences, Springer-Verlag, Berlin, 1981. 43. F. Wu, An unified framework for lpv system analysis and control synthesis, in Proceedings of the IEEE Conference on Decision and Control, Sydney, Australia, December, 2000. 44. T. Yang, A survey of chaotic secure communication systems, Int. J. Comput. Cogn., 2004 (available at http://www.YangSky.com/yangijcc.htm). 45. F. Yang and R.W. Wilde, Observers for linear systems with unknown inputs, IEEE Trans. Automat. Contr., 33 (7), 677–681, 1988. 46. H. Zhou and X.-T. Ling, Problems with the chaotic inverse system encryption approach, IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl., 44 (3), 268–271, 1997.
0882-Perruquetti-ch07_R2_290705
0882-Perruquetti-ch08_R2_170805
8 Normal Forms of Nonlinear Control Systems W. Kang and A. J. Krener
CONTENTS 8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 8.2 Linearly Controllable Systems . . . . . . . . . . 8.3 Linearly Uncontrollable Systems . . . . . . . . 8.4 Examples of Normal Form . . . . . . . . . . . . . 8.4.1 The Normal Form of Ball and Beam . 8.4.2 Engine Compressor . . . . . . . . . . . . . 8.4.3 Controlled Lorenz Equation . . . . . . 8.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.1
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
. . . . . . . . .
345 348 356 367 367 370 373 375 375
Introduction
Numerous papers were published during the last decade on the normal forms of nonlinear control systems with applications in bifurcation and its control. The approach is motivated by Poincaré’s theory of normal forms [1] for classical dynamical systems using homogeneous transformations. In this paper, we summarize a variety of control system normal forms published in the literature so that the normal forms are derived in a similar framework with consistent notations. Before we get into technical details, the rest of this section reviews existing results on some related topics. It is well known that there are several normal forms for a linear control system. If the system is controllable then the system can be transformed into controllable or controller normal form. If the system has a linear output map and is observable, then it can be transformed into an observable or 345
0882-Perruquetti-ch08_R2_170805
346
Normal Forms of Nonlinear Control Systems
observer form. The nonlinear generalization of the linear controller normal forms were extensively studied during the 1980s, for instance, Krener [22], Hunt–Su [11], Jackubczyk–Respondek [10], and Brocket [3], etc. If a nonlinear control system admits a controller normal form, it can be transformed into a linear system by a change of coordinates and feedback. Therefore, the design of a locally stabilizing state feedback control law is a straightforward task. In such a case, we say the system is feedback linearizable. On the other hand, most nonlinear systems do not admit a controller normal form under change of coordinates and invertible state feedback. For systems that are not linearizable, the quadratic approximate version of controller normal form was introduced and discussed in Krener [21] and Krener–Karahan– Hubbard–Frezza [23]. It was proved that, for certain kinds of nonlinear systems, there exist a quadratic change of coordinates and quadratic feedback that transform the system into the linear approximation of the plant dynamics which is accurate to at least the second degree. In this case, we call the system quadratically equivalent to a linear system or quadratically feedback linearizable. However, most nonlinear systems do not admit such a linear approximation. Another way of linearizing a nonlinear control system is dynamic feedback linearization. Some nonlinear systems with more than one input can be linearized by a dynamic feedback even if they are not linearizable by a state feedback. However, it was proved that a dynamic feedback cannot completely linearize a nonlinear system with single input if it is not linearizable by a state feedback (see Charlet–Lévine–Marino [4]). Until late 1980s, the problem of normal forms for nonlinear control systems that are not feedback linearizable was still largely open. On the other hand, the Poincaré normal form of nonlinear dynamic systems has been a successful theory with applications in the study of bifurcations and stability. Although the normal form of Poincaré was not applied to control systems, in Kang [12], the idea of Poincaré was applied to nonlinear control systems with a single input. A normal form was derived for the family of linearly controllable systems with a single input, including systems that are not feedback linearizable. In addition, it was proved in Kang [12] that a dynamic feedback is able to approximately linearize a controllable system to an arbitrary degree. Invariants were found in Kang [12] that uniquely determine the normal form of a control system. The homogeneous parts of degree d from two systems are equivalent under homogeneous transformations if and only if they have the same invariants. Part of the dissertation [12] were published in Kang–Krener [13] and Kang [14, 16]. Starting from early 1990s, the research on normal forms moved in several related but different directions. One active research direction is to find the normal forms of systems with uncontrollable linearizations. Several authors have made contributions to this subject. Quadratic normal forms of systems with uncontrollable linearization were developed by Kang [15, 17, 18]. The results were generalized to higher degree terms
0882-Perruquetti-ch08_R2_170805
8.1
Introduction
347
by Fitch [6] and Tall–Respondek [28, 31] for systems affine in control. In Krener–Kang–Cheng [25], the normal form and invariants of nonlinear control systems with a single input, not necessarily affine in control, is achieved through the third degree. In the following sections, the result is generalized to homogeneous terms of arbitrary degree. The proof in Reference [25] is constructive, which is different from the existence proof adopted in most previous published works. The same constructive proof is adopted in this chapter and generalized to higher degrees. Similar to Poincaré’s theory, the normal form of a control system is invariant under homogeneous transformations of the same degree. However, a normal form of degree k is not unique under transformations of degree less than k. If a normal form is unique under transformation of arbitrary degree, it is call a canonical form. Tall–Respondek [34] solved the problem of canonical form for single-input and linearly controllable systems. For multi-input systems, their nonlinear normal forms and invariants were first studied in Kang [12]. The quadratic normal form and quadratic invariants were derived in Reference [12] for linearly controllable systems in which the controllability indices equal each other. Without any assumption on the controllability indices, Tall–Respondek [32] found a normal form of arbitrary degree for linearly controllable systems with two inputs. The results were further generalized by Tall [33] for linearly controllable systems with any number of inputs. The normal form was derived for homogeneous parts of arbitrary degree. Barbot, Monaco, and Normand-Cyrot [2] derived a linear and quadratic normal form for linearly controllable discrete-time systems. Quadratic and cubic normal forms were derived by Krener–Li [24] for general discretetime systems of both linearly controllable and uncontrollable systems. The approaches adopted by these two groups [2, 24] are different. As a result, the normal forms derived in the two papers are different for linearly controllable systems. The application of normal forms and invariants of control systems is another active research topic. On the basis of normal forms, bifurcations and its control were studied by several authors. In Kang [17–19], bifurcations and their classification for both open-loop and closed-loop systems were studied for systems with a single uncontrollable mode. In Krener– Kang–Cheng [25], control bifurcation for parameterized state feedback was studied. Hamzi–Kang–Barbot [8] used normal forms and invariants to characterize the orientation and stability of periodic trajectories in a Hopf bifurcation under state feedback. Controllability and accessibility of normal forms were addressed in Kang-Xiao-Tall [21]. Bifurcations and their control for discrete-time systems is addressed in References [7, 24]. As an application of canonical form, Respondek–Tall [28, 29] studied the symmetry of nonlinear systems. For linearly controllable and analytical systems that are not feedback linearizable, the group of stationary
0882-Perruquetti-ch08_R2_170805
348
Normal Forms of Nonlinear Control Systems
symmetries contains at most two elements and the group of nonstationary symmetries consist of at most two 1-parameter families. This surprising result follows from the canonical form obtained for single-input systems by Tall–Respondek [34]. Respondek [30] establishes the relationship between flatness and symmetries for two classes of systems: feedback linearizable systems and systems equivalent to the canonical contact system for curves. For these two classes of systems, the minimal flat outputs determine local symmetries and vice versa.
8.2
Linearly Controllable Systems
In this section, a control system with a scalar input is defined by the following equation, x˙ = f (x, u) (8.1) where x ∈ Rn is the state variable and u ∈ R is the control input. Occasionally, it is notationally convenient to denote the control input u by xn+1 . We assume that the function f (x, u) is Ck for sufficiently large k. An equilibrium is a pair (xe , ue ) that satisfies f (xe , ue ) = 0
(8.2)
An equilibrium state xe is one for which there exists an ue so that (xe , ue ) is an equilibrium. Consider the linearization of (8.1) at (xe , ue ), ˙ = Fδx + Gδu, δx
F=
∂f (xe , ue ), ∂x
G=
∂f (xe , ue ). ∂u
(8.3)
A control system (8.1) is linearly controllable at (xe , ue ) if its linearization (8.3) is controllable. The linear system (8.3) is controllable if rank G FG F2 G · · · Fn−1 G = n In this section, the focus is on the normal form of linearly controllable systems. The normal form of a system with an uncontrollable linearization is addressed in Section 8.3. By a translation of the (x, u) coordinate system, we can assume that the equilibrium (xe , ue ) is the origin (0, 0). Following the method of Poincaré, we derive the normal form of (8.1) by applying homogeneous transformations to the following Taylor expansion of (8.1) x˙ = Fx + Gu +
d k=2
f [k] (x, u) + O(x, u)d+1
(8.4)
0882-Perruquetti-ch08_R2_170805
8.2
Linearly Controllable Systems
349
In (8.4), fi[k] (x, u) is a vector field in Rn whose components are homogeneous polynomials of degree k in (x, u). For each homogeneous part, we apply homogeneous transformations to derive the normal form. For control systems, the transformation group includes both changes of state coordinates and invertible state feedbacks. A linear transformation is defined by z = Tx,
v = Kx + Lu
(8.5)
where T ∈ Rn×n is an invertible matrix, K ∈ Rn is a row vector, and L = 0 is a scalar. A transformation of degree k > 1 is defined by z = x − φ [k] (x),
v = u − α [k] (x, u)
(8.6)
A transformation of degree k may change the homogeneous term f [d] (x, u) in (8.4) for d ≥ k. However, a transformation (8.6) does not change any term of degree less than k. Similar to the derivation of Poincaré normal form, we derive the linear normal form of an equilibrium of a control system using a linear transformation. Then a quadratic transformation is used to derive the quadratic normal form. Because the quadratic transformation leaves the linear part invariant, the derivation of quadratic normal form does not change the linear normal form. In general, if the normal forms of f [1] (x, u), . . . , f [k−1] (x, u) have been derived, a transformation of degree k is used to derive the normal form for of f [k] in (8.4), which leaves the normal form of f [l] (x, u) invariant for 1 ≤ l ≤ k − 1. It is well known that by linear transformation (8.6), a linear control system x˙ = Fx + Gu
(8.7)
can be brought to the Brunovsky form z˙ = Az + Bv
(8.8)
where A and B are of the form
0 0 . . A= . 0 0
1 0 .. .
0 1 .. .
0 0
0 0
··· ··· .. . ··· ···
0 0 .. . 1 0
n×n
,
0 0 . . B= . 0 1
(8.9)
n×1
The existence of such a linear transformation is proved in many textbooks of linear control systems.
0882-Perruquetti-ch08_R2_170805
350
Normal Forms of Nonlinear Control Systems
Consider a linearly controllable system (8.4). We adopt the Brunovsky form as the linear normal form. There exists a linear transformation that brings (8.4) to the form x˙ = Ax + Bu + f [2] (x, u) + O(x, u)3
(8.10)
where (A, B) are defined by (8.9). In the following, we use a quadratic transformation z = x − φ [2] (x),
v = u − α [2] (x, u)
(8.11)
to simplify the quadratic nonlinear part of the system. There are two basic operations, pull up and push down, which are used to achieve this. Consider a part of the dynamics x˙ i−1 = xi + · · · x˙ i = xi+1 + cxj xk + · · ·
(8.12)
where 2 ≤ i ≤ n, 1 ≤ j ≤ k ≤ n + 1, recall xn+1 = u. The + · · · indicates other quadratic and higher degree terms. The other quadratic terms will not be changed by the operations that we perform. The higher terms may be changed but we are not interested in them at this time. If j < k − 1 we can pull up the quadratic term by defining zi = xi − cxj xk−1 zl = xl
if l = i
(8.13)
Its inverse transform satisfies xi = zi + czj zk−1 + O(z)3
(8.14)
Then the dynamics becomes z˙ i−1 = zi + czj zk−1 + · · · z˙ i = zi+1 − czj+1 zk−1 + · · ·
(8.15)
and all the other quadratic terms remain the same. In each of the new quadratic terms, the two indices are closer together than the two indices of
0882-Perruquetti-ch08_R2_170805
8.2
Linearly Controllable Systems
351
the original quadratic term. If j = k − 1, we can pull up the quadratic term by defining c zi = xi − xj xj 2 zl = xl
(8.16)
if l = i
then the dynamics becomes c z˙ i−1 = zi + zj zj + · · · 2
(8.17)
z˙ i = zi+1 + · · · and all the other quadratic terms remain the same. The two indices of the new quadratic term are identical. Note also that in either case if i = 1, we can still pull up and there is no zi−1 dynamics to be concerned with, so a term disappears. By pulling up all the quadratic terms until the two indices are equal, we obtain n+1 i,j xj2 + · · · (8.18) x˙ i = xi+1 + j=1
where x denotes the new state coordinate after the pull up process. This form can be simplified further by the other operation on the dynamics, push down. Consider a piece of the dynamics x˙ i = xi+1 + cxj xk + · · · x˙ i+1 = xi+2 + · · ·
(8.19)
where 1 ≤ i ≤ n − 1 and 1 ≤ j ≤ k ≤ n. Define zi+1 = xi+1 + cxj xk zl = xl
if l = i + 1
(8.20)
Its inverse transformation satisfies xi+1 = zi+1 − czj zk + O(z)3
(8.21)
The transformation (8.20) yields z˙ i = zi+1 + · · · z˙ i+1 = zi+2 + czj+1 zk + czj zk+1 + · · ·
(8.22)
0882-Perruquetti-ch08_R2_170805
352
Normal Forms of Nonlinear Control Systems
and all the other quadratic terms remain unchanged. Notice that if i + 1 = n then we can absorb any quadratic term into the control using feedback. The terms in (8.19), where 1 ≤ j ≤ k ≤ i + 1, can be pushed down repeatedly and absorbed in the control. If the control appears in the derivative of one of the states, then we cannot push that term down any further since the control need not be differentiable. So, if the term cxj xk appears in the equation for z˙ i with j or k greater than i + 1 and we try to repeatedly push it down then the control will appear before we reach the equation for z˙ n . For this reason, we only push down a quadratic term xj xk with both j and k less than or equal to i + 1. As a result, the system (8.18) is transformed into the following quadratic normal form. x˙ i = xi+1 +
n+1
i,j xj xj + O(x, u)3 ,
for 1 ≤ i ≤ n − 1
j=i+2
(8.23)
x˙ n = u + O(x, u)3 where x represents the new state coordinates after the push down process.
Example 1 The following is the quadratic normal form of the general two-dimensional linearly controllable system. x˙ 1 = x2 + 1,3 u2 + O(x, u)3 x˙ 2 = u + O(x, u)3
(8.24)
Notice there is only one coefficient that cannot be normalized to zero and this is the invariant of the system under quadratic transformations. The following is the quadratic normal form of the general threedimensional linearly controllable system: x˙ 1 = x2 + 1,3 x32 + 1,4 u2 + O(x, u)3 x˙ 2 = x3 + 2,4 u2 + O(x, u)3
(8.25)
x˙ 3 = u + O(x, u)3 Now there are three coefficients that cannot be normalized to zero and these are the invariants of the system under quadratic transformations. For the rest of the section, we use pull up and push down to prove the following theorem on general normal forms.
0882-Perruquetti-ch08_R2_170805
8.2
Linearly Controllable Systems
353
THEOREM 1
Suppose (8.1) is linearly controllable. Suppose the vector field f (x, u) is Cd+1 . Then by a change of coordinates and a state feedback, (8.1) can be transformed into the following normal form z˙ = Az + Bv +
d
f˜ [k] (z) + O(z, v)d+1
k=2
f˜i[k] (z)
=
n+1
(8.26)
[k−2] i,j (¯zj )zj2
j=i+2 [k−2] where (A, B) is in the Brunovsky form. The coefficient i,j (¯zj ) is a homogeneous polynomial of degree k − 2 in the variable z¯ j = (z1 , z2 , . . . , zj ). When there are no terms in the sum then it is zero as in
f˜n[k] (z) =
n+1
[k−2] i,j (¯zj )zj2 = 0
(8.27)
j=n+2
Consider the expansion (8.4). The proof follows by mathematical induction. We have derived the linear and quadratic normal forms. Suppose that all homogeneous parts of degree less than m in (8.4) are transformed into their normal forms, consider the homogeneous part f [m] (x) in (8.4). A part of the dynamics has the form
PROOF
x˙ i−1 = xi +
m−1
[k] (x, u) + · · · f˜i−1
k=2
x˙ i = xi+1 +
m−1
(8.28) f˜i[k] (x, u) + cxj1 xj2 · · · xjm + · · ·
k=2
where 2 ≤ i ≤ n, 1 ≤ j1 ≤ j2 ≤ · · · ≤ jm ≤ n + 1, recall xn+1 = u. The + · · · stands for other homogeneous terms of degree m and higher. The other terms of degree m will not be affected by the operations that we perform and we ignore the higher degree terms. A transformation of degree m does not change the normal form of degree less than m. If jm−1 < jm − 1 we can pull up the degree m term by defining zi = xi − cxj1 xj2 · · · xjm−1 xjm −1 zl = xl ,
for l = i
(8.29)
0882-Perruquetti-ch08_R2_170805
354
Normal Forms of Nonlinear Control Systems
then the dynamics becomes z˙ i−1 = zi +
m−1
[k] (z, u) + czj1 zj2 · · · zjm−1 zjm −1 + · · · f˜i−1
k=2
z˙ i = zi+1 +
m−1
f˜i[k] (z, u) − czj1 +1 zj2 · · · zjm−1 zjm −1
(8.30)
k=2
− czj1 zj2 +1 · · · zjm−1 zjm −1 − · · · − czj1 zj2 · · · zjm−1 +1 zjm −1 + · · · = zi+1 +
m−1
f˜i[k] (z, u) − c
k=2
m−1 k=1
zj1 zj2 · · · zjm−1 zjm −1 zjk +1 + · · · zjk
and all the other degree m terms remain the same. Notice that the two largest indices of the new degree m terms are closer together than those of the original degree m term. If jm−p−1 < jm−p = jm−p+1 = · · · jm−1 = jm − 1, we can pull up the degree m term by defining zi = xi −
c p+1 xj1 xj2 · · · xjm−p−1 xjm −1 p+1
zl = xl ,
for l = i
(8.31)
then the dynamics becomes z˙ i−1 = zi +
m−1
[k] (z, u) + f˜i−1
k=2
z˙ i = zi+1 +
m−1
c p+1 zj zj · · · zjm−p−1 zjm −1 + · · · p+1 1 2 p+1
f˜i[k] (z, u) −
k=2
m−p−1 zj1 zj2 · · · zjm−p−1 zjm −1 c zjk +1 + · · · p+1 z jk k=1
(8.32) and all the other degree m terms remain the same. Notice that the two largest indices of the new degree m terms are identical. In any case, if i = 1 then we can still pull up and there is no zi−1 dynamics to be concerned with, so a term disappears. By pulling up all the degree m terms until their two largest indices are identical, we obtain x˙ i = xi+1 +
m−1
f˜i[k] (x, u) +
k=2
which is almost the normal form (8.26).
n+1 j=1
[m−2] i,j (¯xj )xj2 + · · ·
(8.33)
0882-Perruquetti-ch08_R2_170805
8.2
Linearly Controllable Systems
355 j
By pushing down, we can make i = 0 for 1 ≤ j ≤ i + 1. Consider a piece of the dynamics, x˙ i = xi+1 +
m−1
f˜i[k] (x, u) + cxj1 xj2 · · · xjm + · · ·
k=2
x˙ i+1 = xi+2 +
m−1
(8.34) [k] (x, u) + · · · f˜i+1
k=2
If 1 ≤ j1 ≤ j2 ≤ · · · ≤ jm ≤ n, define zi+1 = xi+1 + cxj1 xj2 · · · xjm zl = xl ,
(8.35)
for l = i + 1
yielding z˙ i = zi+1 +
m−1
f˜i[k] (z, u) + · · ·
k=2
z˙ i+1 = zi+2 +
m−1
[k] (z, u) + c f˜i+1
k=2
m zj1 zj2 · · · zjm k=1
zjk
(8.36) zjk +1 + · · ·
and all the other degree m terms remain unchanged. Notice that if i + 1 = n, then we can absorb the degree m terms into the control using feedback. The terms in (8.33) where 1 ≤ j1 ≤ j2 ≤ · · · ≤ jm ≤ i + 1 can be repeatedly pushed down and absorbed in the control. The result is (8.26).
Example 2 The following is the normal form up to the fourth degree for a general three-dimensional system: x˙ 1 = x2 + 1,3 (x)x32 + 1,4 (x, u)u2 + O(x, u)4 x˙ 2 = x3 + 2,4 (x, u)u2 + O(x, u)4
(8.37)
x˙ 3 = u + O(x, u)4 [0] [1] [2] [k] where i,j = i,j + i,j + i,j and i,j is a homogeneous polynomial of degree k.
0882-Perruquetti-ch08_R2_170805
356
8.3
Normal Forms of Nonlinear Control Systems
Linearly Uncontrollable Systems
In this section, we generalize the results of Section 8.2 to systems with uncontrollable linearization. Consider a control system (8.1). Assume that the controllability matrix of its linearization (8.3) has a rank n1 < n. It is well known that by linear change of state coordinates and linear state feedback, the system can be brought to the form
x˙ 0 x˙ 1
= +
A0 0 d
0 A1
k=2
x0 x1
+
f0[k] (x0 , x1 , u) f1[k] (x0 , x1 , u)
0 B1
u
+ O(x0 , x1 , u)d+1
where x0 and x1 are n0 - and n1 -dimensional, respectively; n0 + n1 = n, u ∈ R, A0 is in the block diagonal Jordan form, A1 , B1 are in the Brunovsky form, and fr[d] (x0 , x1 , u) is a vector field which is a homogeneous polynomial of degree d in its arguments. The linear change of coordinates that brings A0 to the Jordan form may be complex, in which case some of the coordinates x0,i are complex. The complex coordinates come in conjugate [k] pairs. The corresponding f0,i are complex valued and come in conjugate pairs. In some formulae, the control input is treated as a state variable u = x0,n1 +1 . A nonlinear vector field fr[k] (x0 , x1 , u), r = 0, 1, has the following decomposition fr[k] (x0 , x1 , u) =
fr[l] (x0 ; x1 , u)
(8.38)
|l|=k
where [l] = [l0 ; l1 ] is a multi-index and fr[l] (x0 ; x1 , u) denotes a polynomial vector field homogeneous of degree l0 in x0 and homogeneous of degree l1 in (x1 , u), |l| = l0 + l1 . A homogeneous transformation of degree k has the following form
z0 z1
=
x0 x1
−
φ0[k] (x0 , x1 ) φ1[k] (x0 , x1 )
v = u − α [k] (x0 ; x1 , u)
(8.39)
0882-Perruquetti-ch08_R2_170805
8.3
Linearly Uncontrollable Systems
357
We can expand it as follows:
z0 z1
=
x0 x1
v=u−
−
|l|=k
φ0[l] (x0 ; x1 ) φ1[l] (x0 ; x1 )
(8.40)
[l]
α (x0 ; x1 , u)
|l|=k
where φr[l] (x0 ; x1 ) denotes a vector field that is homogeneous of degree l0 in x0 and homogeneous of degree l1 in x1 . Similarly, α [l] (x0 ; x1 , u) is a polynomial homogeneous of degree l0 in x0 and homogeneous of degree l1 in (x1 , u). Under a transformation (8.40), the degree [l] terms are transformed into ∂φ [l] f˜0[l] (z0 ; z1 , v) = f0[l] (z0 ; z1 , v) − 0 (z0 ; z1 )A0 z0 ∂z0 −
∂φ0[l] (z0 ; z1 ) (A1 z1 + B1 v1 ) + A0 φ0[l] (z0 ; z1 ) ∂z1
∂φ [l] f˜1[l] (z0 ; z1 , v) = f1[l] (z0 ; z1 , v) − 1 (z0 ; z1 )A0 z0 ∂z0 −
(8.41)
∂φ1[l] (z0 ; z1 ) (A1 z1 + B1 v1 ) ∂z1
+ A1 φ1[l] (z0 ; z1 ) + B1 α [l] (z0 ; z1 , v) This is still a homogeneous vector of degree [l]. We have proved the following lemma. LEMMA 1
After the transformation (8.40), the new homogeneous part f˜0[l] is completely determined by f0[l] and φ0[l] (x0 ; x1 ). The new homogeneous part f˜1[l] is completely determined by f1[l] , φ1[l] (x0 ; x1 ), and α [l] (x0 ; x1 , v). According to the lemma, each component of the term, f˜r[l] , that is homogeneous of degree [l] can be considered separately in the derivation of the normal form. Following Poincaré, (8.41) is called a homological equation. In the derivation of the normal form, the quadratic transformation is first applied to (8.38) to derive the normal form of f [2] (x0 , x1 , u). Then, a cubic transformation is used to derive the normal form of the cubic part. In general, after the normal form of degree less than k has been found, a homogeneous transformation of degree k is used to derive the normal form of f [k] (x0 , x1 , u).
0882-Perruquetti-ch08_R2_170805
358
Normal Forms of Nonlinear Control Systems
THEOREM 2
Consider a control system (8.38). There exist homogeneous transformations of the form (8.39) with k = 2, 3, . . . , d that transform the system (8.38) into the normal form
z˙ 0 0 A0 z0 0 = + v 0 A1 z˙ 1 z1 B1
(8.42) d f˜0[k] (z0 , z1 , v) d+1 + O(z0 , z1 , v) + f˜1[k] (z0 , z1 , v) k=2 where f˜0[k] , f˜1[k] have the following decomposition: k
f˜0[k] (z0 , z1 , v) = f˜0[k;0] (z0 ) + f˜0[k−1;1] (z0 ; z1,1 ) +
[k−l ;l ] f˜0 1 1 (z0 ; z1 , v)
l1 =2
f˜1[k] (z0 , z1 , v) =
k
(8.43)
[k−l ;l ] f˜1 1 1 (z0 ; z1 , v)
l1 =2
The vector field f˜0[k;0] (z0 ) is in the Poincaré normal form
[k;0] f˜0,i (z0 ) =
j
βi,j z0
(8.44)
|j| = k j · λ = λi where j = (j1 , . . . , jn0 ) is a multi-index of nonnegative integers, |j| = j1 + · · · + j
j
jn
1 jn0 , j · λ = j1 λ1 + · · · + jn0 λn0 , and z0 = z0,1 · · · z0,n0 0 . The other vector fields are as follows:
[k−1;1] f˜0,i (z0 ; z1,1 ) = γi[k−1] (z0 )z1,1 [k−l ;l ] f˜0,i 1 1 (z0 ; z1 , v) =
n 1 +1
[k−l1 ;l1 −2]
δi,j
i = 1, . . . , n0 2 (z0 ; z¯ 1,j )z1,j
i = 1, . . . , n0 l1 = 2, . . . , k
j=1 [k−l ;l ] f˜1,i 1 1 (z0 ; z1 , v) =
n 1 +1
[k−l1 ;l1 −2]
i,j
2 (z0 ; z¯ 1,j )z1,j
i = 1, . . . , n1
(8.45)
j=i+2 [k−l ;l −2] where j is a scalar index, z1,n1 +1 = v, z¯ 1,j = (z1,1 , z1,2 , . . . , z1,j ) and δi,j 1 1
[k−l ;l −2] (z0 ; z¯ 1,j ), i,j 1 1 (z0 ; z¯ 1,j ) are polynomials homogeneous of degree k − l1 in z0 and homogeneous of degree l1 − 2 in (z1 , v).
0882-Perruquetti-ch08_R2_170805
8.3
Linearly Uncontrollable Systems
359
Suppose the homogeneous vector fields f [k] (x0 , x1 , u), for all k ≤ d − 1, are already in normal form. Consider the homogeneous term of degree d. A transformation of degree d does not change the homogeneous parts of degree less than d. It changes the terms of degree greater or equal to d. Because of Lemma 1, we can derive the normal form for each homogeneous part fr[l] separately. Consider f1[d;0] (x0 ; x1 , u). Given a part of the system
PROOF
x˙ 1,i = x1,i+1 +
d−1
[k] (x0 , x1 , u) + cx0,j1 x0,j2 · · · x0,jd + · · · f˜1,i
k=2
x˙ 1,i+1 = x0,i+2 +
d−1
(8.46) [k] f1,i+1 (x0 , x1 , u) + · · ·
k=2
The following push down z1,i+1 = x1,i+1 + cx0,j1 x0,j2 · · · x0,jd zs,t = xs,t ,
if (s, t) = (1, i + 1)
(8.47)
brings (8.46) to z˙ 1,i = z1,i+1 +
d−1
[k] (z0 , z1 , u) + · · · f˜1,i
k=2
z˙ 1,i+1 = z1,i+2 + +
d−1
(8.48) [k] f1,i+1 (z0 , z1 , u) +
k=2
d (cx0,j1 x0,j2 · · · x0,jd ) + · · · dt
Because the lowest homogeneous part of (d/dt)(cx0,j1 x0,j2 · · · x0,jd ) is still a term of degree [d; 0], it can be further pushed down. When i = n1 , the nonlinear term is absorbed by the feedback. Therefore, all terms of degree [d; 0] can be canceled by nonlinear transformations. Consider f1[d−1;1] (x0 ; x1 , u). Given a part of the system: x˙ 1,i−1 = x1,i +
d−1
[k] (x0 , x1 , u) + · · · f˜1,i−1
k=2
x˙ 1,i = x1,i+1 +
d−1 k=2
(8.49) [k] (x0 , x1 , u) + cx0,j1 x0,j2 · · · x0,jd−1 x1,jd + · · · f˜1,i
0882-Perruquetti-ch08_R2_170805
360
Normal Forms of Nonlinear Control Systems
If jd > 1, we can pull up the degree m term by defining z1,i = x1,i − cx0,j1 x0,j2 · · · x0,jd−1 x1,jd −1 zs,t = xs,t ,
if (s, t) = (1, i)
(8.50)
The new system has the form: z˙ 1,i−1 = z1,i +
d−1
[k] (z0 , z1 , u) + cz1,j1 z1,j2 · · · z1,jd−1 z1,jd −1 + · · · f˜1,i−1
k=2
z˙ 1,i = z1,i+1 +
d−1 k=2
d [k] (z0 , z1 , u) − (cx0,j1 x0,j2 · · · x0,jd−1 )x1,jd −1 + · · · f˜1,i dt (8.51)
In all the new terms of degree [d − 1; 1], the index of the controllable factors is jd − 1, which is smaller than the original index jd . If i = 1, we can cancel the degree [d − 1; 1] term without worrying about the equation of x˙ i−1 . Repeat the pull up transformation until all the degree [d − 1; 1] terms are brought to homogeneous terms in the form x0,j1 x0,j2 · · · x0,jd−1 x1,1 , in which jd = 1. Now, consider a part of the system x˙ 1,i = x1,i+1 +
d−1
[k] (x0 , x1 , u) + cx0,j1 x0,j2 · · · x0,jd−1 x1,1 + · · · f˜2,i
k=2
x˙ 1,i+1 = x1,i+2 +
d−1
(8.52) [k] (x0 , x1 , u) + · · · f˜2,i+1
k=2
A push down transformation z1,i+1 = x1,i+1 + cx0,j1 x0,j2 · · · x0,jd−1 x1,1 zs,t = xs,t ,
if (s, t) = (1, i + 1)
(8.53)
yields z˙ 2,i = z1,i+1 +
d−1
[k] (z0 , z1 , u) + · · · f˜1,i
k=2
z˙ 2,i+1 = z1,i+2 +
d−1 k=2
d [k] (z0 , z1 , u) + (cx0,j1 x0,j2 · · · x0,jd−1 )x1,1 f˜1,i+1 dt
+ cx0,j1 x0,j2 · · · x0,jd−1 x1,2 + · · ·
(8.54)
0882-Perruquetti-ch08_R2_170805
8.3
Linearly Uncontrollable Systems
361
Repeating the push down process, all degree [d − 1; 1] terms are finally pushed to the equation for x˙ 1,n1 , where they are canceled by the feedback. Therefore, f1[d−1;1] (x0 ; x1 , u) can be eliminated by homogeneous transformations. [l ;l ] Consider f1 0 1 (x0 ; x1 , u) with 2 ≤ l1 ≤ d. A part of the dynamics has the form
x˙ 1,i−1 = x1,i +
d−1
[d] (x0 , x1 , u) + · · · f˜1,i−1
k=2
x˙ 1,i = x1,i+1 +
d−1
(8.55) [d] (x0 , x1 , u) + c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl + · · · f˜1,i 1
k=2 [l ;l ] The derivation of f˜1 0 1 is similar to that in Section 8.2. If jl1 −1 < jl1 − 1 the pull up transformation is defined by
z1,i = x1,i − c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl
1 −1
zs,t = xs,t ,
x1,jl
1
−1
(8.56)
if (s, t) = (1, i)
then the dynamics becomes
z˙ 1,i−1 = z1,i +
d−1
[k] (z0 , z1 , u) + c[l0 ] (z0 )z1,j1 z1,j2 · · · z1,jl f˜1,i−1
1 −1
z1,jl
1
−1
+ ···
k=2
z˙ 1,i = z1,i+1 +
d−1
[k] (z0 , z1 , u) f˜1,i
k=2
− c[l0 ] (z0 )
l 1 −1 k=1
−
z1,j1 z1,j2 · · · z1,jl
1 −1
z1,jk
z1,jl
1
−1
z1,jk +1
(8.57)
d [l0 ] (c (x0 ))x1,j1 x1,j2 · · · x1,jl −1 x1,jl −1 + · · · 1 1 dt
The lowest terms in the time derivative of c[l0 ] (x0 ) are still polynomials of x0 with the degree l0 . As a result of the pull up, the two largest indices of z1 in the new terms are jl1 −1 , jl1 − 1 and jl1 −1 + 1, jl1 − 1, which are closer together than those of the original term. If jl1 −p−1 < jl1 −p = jl1 −p+1 = · · · jl1 −1 = jl1−1,
0882-Perruquetti-ch08_R2_170805
362
Normal Forms of Nonlinear Control Systems
we define the pull up transformation by z1,i = x0,i − zs,t = xs,t
c[l0 ] (x0 ) p+1 x1,j1 x1,j2 · · · x1,jl −p−1 x1,jl −1 1 1 p+1
(8.58)
for (s, t) = (1, i)
then the dynamics becomes z˙ 2,i−1 = z1,i +
d−1
[k] (z0 , z1 , u) f˜1,i−1
k=2
+
c[l0 ] (z
0)
p+1
z˙ 1,i = z1,i+1 +
z1,j1 z1,j2 · · · z1,jl
d−1
1 −p−1
p+1 −1 1
z1,jl
+ ···
[k] (z0 , z1 , u) f˜1,i
(8.59)
k=2 p+1
l1 −p−1 c[l0 ] (z0 ) z1,j1 z1,j2 · · · z1,jl1 −p−1 z1,jl1 −1 − z1,jk +1 p+1 z1,jk k=1
−
d [l0 ] p+1 (c (x0 ))x1,j1 x1,j2 · · · x1,jl −p−1 z1,jl −1 + · · · 1 1 dt
Notice that the two largest indices of variable x1,j in the new degree [l0 ; l1 ] terms are identical. In any case, if i = 1 then we can still pull up and there is no z1,i−1 dynamics to be concerned with, so a term disappears. By pulling up all the degree [l0 ; l1 ] terms until their two largest indices of x1,j are identical, we obtain x˙ 1,i = x1,i+1 +
d−1 k=2
[k] (x0 , x1 , u) + f˜1,i
n 1 +1
[d−2] 2 i,j (x0 , x¯ 1,j )x1,j + ···
(8.60)
j=1
[d−2] By pushing down we can make i,j = 0 for 1 ≤ j ≤ i + 1. Consider a piece of the dynamics,
x˙ 1,i = x1,i+1 +
d−1
[k] (x0 , x1 , u) + c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl + · · · f˜1,i 1
k=2
x˙ 1,i+1 = x1,i+2 +
d−1 k=2
(8.61) [k] (x0 , x1 , u) + · · · f˜1,i+1
0882-Perruquetti-ch08_R2_170805
8.3
Linearly Uncontrollable Systems
363
If 1 ≤ j1 ≤ j2 ≤ · · · ≤ jl1 ≤ n1 , define z1,i+1 = x0,i+1 + c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl
1
zs,t = xs,t ,
(8.62)
for (s, t) = (1, i + 1)
yielding
z˙ 1,i = z1,i+1 +
d−1
[k] (z0 , z1 , u) + · · · f˜1,i
k=2
z˙ 1,i+1 = z1,i+2 +
d−1
[k] (z0 , z1 , u) + c[l0 ] (z0 ) f˜1,i+1
k=2
×
l1 z1,j1 z1,j2 · · · z1,jl
1
k=1
z1,jk
d [l0 ] (c (x0 ))x1,j1 x1,j2 · · · x1,jl + · · · 1 dt
z1,jk +1 (8.63)
and all the other degree d terms remain unchanged. Notice that if i + 1 = n1 then we can absorb the degree d terms into the control using feedback. The terms in (8.60) where 1 ≤ j1 ≤ j2 ≤ · · · ≤ jl1 ≤ i + 1 can be repeatedly pushed down and absorbed in the control. The result is the normal form of f˜1[k] (z0 , z1 ) in (8.45). Consider f0[d;0] (x0 ). Its homological equation (8.41) is independent of the feedback. Therefore, the normal form is the same as the Poincaré normal form. Consider f0[d−1;1] (x0 ; x1 , u). Given a part of the dynamics
x˙ 0,i−1 = λi−1 x0,i−1 + δi−1 x0,i +
d−1
[k] (x0 , x1 , u) + · · · f˜0,i−1
k=2
x˙ 0,i = λi x0,i + δi x0,i+1 +
d−1
[k] (x0 , x1 , u) + c[d−1] (x0 )x1,j f˜0,i
(8.64) + ···
k=2
where 2 ≤ i ≤ n0 , 1 ≤ j ≤ n1 + 1. The coefficients δi−1 and δi equal 0 or 1. If j > 1, then we can pull up by defining z0,i = x0,i − c[d−1] (x0 )x1,j−1 zs,t = xs,t
if (s, t) = (0, i)
(8.65)
0882-Perruquetti-ch08_R2_170805
364
Normal Forms of Nonlinear Control Systems
so that
z˙ 0,i−1 = λi−1 z0,i−1 + δi−1 (z0,i + c[d−1] (z0 )z1,j−1 ) +
d−1
[k] (z0 , z1 , u) + · · · f˜1,i−1
k=2
z˙ 0,i = λi z0,i + δi z0,i+1 +
d−1
(8.66) [k] (z0 , z1 , u) f˜0,i
k=2
+ λi c[d−1] (z0 )z1,j−1 −
d [d−1] (c (z0 ))z1,j−1 + · · · dt
The new degree [d − 1; 1] terms have last index 1, j − 1 instead of 1, j. We can continue to pull up until j = 1. The result is the normal form f˜1[d−1;1] in (8.45). If i = 1, the pull up cancels the [d − 1; 1] term if j > 1. [l ;l ] Consider f0 0 1 (x0 ; x1 , u) with 2 ≤ l1 ≤ d. Given a part of the system
x˙ 0,i−1 = λi−1 x0,i−1 + δi−1 x0,i +
d−1
[k] (x0 , x1 , u) + · · · f˜0,i−1
k=2
x˙ 1,i = λi x0,i + δi x0,i+1 +
d−1
(8.67)
[k] (x0 , x1 , u) f˜0,i
k=2
+ c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl + · · · 1
where 1 ≤ j1 ≤ j2 ≤ · · · ≤ jl1 ≤ n1 + 1. The coefficients δi−1 and δi equal 0 or 1. If jl1 −1 < jl1 − 1, then we can pull up by defining
z0,i = x0,i − c[l0 ] (x0 )x1,j1 x1,j2 · · · x1,jl
1
zs,t = xs,t ,
if (s, t) = (0, i)
−1
(8.68)
0882-Perruquetti-ch08_R2_170805
8.3
Linearly Uncontrollable Systems
365
so that z˙ 0,i−1 = λi−1 z0,i−1 + δi−1 (z0,i + c[l0 ] (z0 )z1,j1 z1,j2 · · · z1,jl
1
+
d−1
−1 )
[k] (z0 , z1 , u) + · · · f˜1,i−1
k=2
z˙ 0,i = λi z0,i + δi z0,i+1 +
d−1
[k] (z0 , z1 , u) f˜0,i
(8.69)
k=2
+ λi c[l0 ] (z0 )z1,j1 z1,j2 · · · z1,jl
−1
−
z1,j1 z1,j2 · · · z1,jl
−1
1
− c[l0 ] (z0 )
l 1 −1
1
z1,jk
k=1
d [l0 ] (c (z0 ))z1,j1 z1,j2 · · · z1,jl −1 1 dt z1,jk +1 + · · ·
In the new [l0 ; l1 ] terms, the two largest indices of x0,j are closer than before. If jl1 −p−1 < jl1 −p = jl1 −p+1 = · · · = jl1 −1 = jl1 − 1 for some p ≥ 1, define the following pull up transformation z0,i = x0,i −
c[l0 ] (x0 ) p+1 x1,j1 · · · x1,jl −p−1 x1,jl −1 1 1 p+1
zs,t = xs,t ,
if (s, t) = (0, i)
(8.70)
Then z˙ 0,i−1 = λi−1 z0,i−1 + δi−1 +
d−1
c[l0 ] (z0 ) p+1 z0,i + z1,j1 · · · z1,jl −p−1 z1,jl −1 1 1 p+1
[k] (z0 , z1 , u) + · · · f˜0,i−1
k=2
z˙ 0,i = λi z0,i + δi z0,i+1 +
d−1
[k] (z0 , z1 , u) f˜0,i
k=2
+ λi
c[l0 ] (z
0)
(8.71)
p+1 z1,j1 · · · z1,jl −p−1 z1,jl −1 1 1
p+1 d c[l0 ] (x0 ) p+1 x1,j1 · · · x1,jl −p−1 x1,jl −1 − 1 1 dt p+1 p+1
l1 −p−1 c[l0 ] (z0 ) z1,j1 · · · z1,jl1 −p−1 z1,jl1 −1 − z1,jk +1 + · · · p+1 z1,jk k=1
0882-Perruquetti-ch08_R2_170805
366
Normal Forms of Nonlinear Control Systems
In the new [l0 ; l1 ] terms, the last two indices of x1,j are equal. We repeat the 2 . pull up process until all [l0 ; l1 ] terms have the form c(z0 , z¯ 1,j )z1,j
8.4
Examples of Normal Form
The derivation of normal forms for specific engineering systems is not necessarily a complicated process. In this section, we introduce three examples. In each example, the normal form can be easily derived through simple transformations of push up and pull down.
8.4.1 The Normal Form of Ball and Beam Consider the ball and beam experiment shown in Figure 8.1. The system model adopted in this section is from Hauser et al. [9]. We assume that the beam rotates around the axis at its center. The ball rolls along the beam. The control input of the system is τ , the angular acceleration of the beam. The state variables are r, the distance from the center of the ball to the axis, and θ, the angle of the beam. Let J be the moment of inertia of the beam, m be the mass of the ball, and g be the acceleration of gravity. The equations
m
50
r
100 150 200
mg
250
θ
300 350
τ
400 450 500 100
200
300
FIGURE 8.1 The configuration of ball and beam system.
400
500
600
700
0882-Perruquetti-ch08_R2_170805
8.4
Examples of Normal Form
367
of motion are 0 = r¨ + g sin θ − rθ˙ 2 τ = (mr2 + J)θ¨ + 2mr˙rθ˙ + mgr cos θ
(8.72)
Let τ = 2mr˙rθ˙ + mgr cos θ + (mr2 + J)u
(8.73)
This is an invertible feedback under which the system (8.72) is equivalent to x˙ 1 = x2 x˙ 2 = −g sin x3 + x1 x42 x˙ 3 = x4
(8.74)
x˙ 4 = u ˙ The origin (x1 , x2 , x3 , x4 ) = where x1 = r, x2 = r˙ , x3 = θ, and x4 = θ. (0, 0, 0, 0) is an equilibrium point of the system. The linearization of the system at the origin is δ x˙ 1 = δx2 δ x˙ 2 = −gδx3 δ x˙ 3 = δx4
(8.75)
δ x˙ 4 = δu Obviously, the linearization is controllable. So, the model (8.74) of ball and beam system is linearly controllable at the origin. In the following, we derive the normal form for the system (8.74). First, we focus on the nonlinear term g sin x3 . We will handle the term x1 x42 later. Instead of dealing with the homogeneous terms separately, system (8.74) allows us to push down all the homogeneous terms in g sin x2 simultaneously. The push down transformation is z3 = −g sin x3
(8.76)
after which the system becomes x˙ 1 = x2 x˙ 2 = z3 + x1 x42 z˙ 3 = −gx4 cos x3 x˙ 4 = u
(8.77)
0882-Perruquetti-ch08_R2_170805
368
Normal Forms of Nonlinear Control Systems
One more step of pushing down by z4 = −gx4 cos x3
(8.78)
yields x˙ 1 = x2 x˙ 2 = z3 + x1 x42 z˙ 3 = z4
(8.79)
z˙ 4 = −gu cos x3 + gx42 sin x3 If −(π/2) < x3 < (π/2) we can define an invertible feedback v = −gu cos x3 + gx42 sin x3 and then the system becomes x˙ 1 = x2 x˙ 2 = z3 + x1 x42 z˙ 3 = z4
(8.80)
z˙ 4 = v Now, we have to deal with the term x1 x42 in (8.80). From (8.76) and (8.78), the inverse transformation satisfies z3 x3 = arcsin − g (8.81) z4 x4 = − g cos(arcsin(−z3 /g)) Define z1 = x1 , z2 = x2 , (8.80) is equivalent to z˙ 1 = z2 z˙ 2 = z3 + z˙ 3 = z4 z˙ 4 = v
z1 z42 g2 cos2 (arcsin(−z3 /g))
(8.82)
0882-Perruquetti-ch08_R2_170805
8.4
Examples of Normal Form
369
However, z3 z3 cos2 arcsin − = 1 − sin2 arcsin − g g =1−
z32 g2
So, the system (8.82) is equivalent to z˙ 1 = z2 z˙ 2 = z3 +
z1 g2
− z32
z42
(8.83)
z˙ 3 = z4 z˙ 4 = v This system is in normal form. Its homogeneous parts of any degree can be found in the following Taylor expansion z˙ 1 = z2 z˙ 2 = z3 +
∞ k=0
1 z1 z32k z42 2k+2 g
(8.84)
z˙ 3 = z4 z˙ 4 = v
8.4.2
Engine Compressor
The second example is the Moore–Greitzer three state model of an axial flow compressor. The model is a typical example of a control system with both classical and control bifurcations. When the engine compressor is operated around the equilibrium with the maximum pressure rise, a classical bifurcation occurs in its uncontrolled dynamics. There is also a control bifurcation in the control system. On a branch of the bifurcated equilibria, the system exhibits rotating stall which can cause severe vibrations with rapid and catastrophic consequences. In the following, a model of engine compressor is introduced. Then the normal form of the model is derived at the point where rotating stall occurs.
0882-Perruquetti-ch08_R2_170805
370
Normal Forms of Nonlinear Control Systems
The Moore–Greitzer model of an engine compressor described in Eveker et al. [5] is 2 dA
3αH = A 1− −1 − dξ 2W W d 1
− + c = −1 − dξ lc W
A2 4W 2
3HA2 4W 2
−1 W
(8.85)
d 1 =
− FT−1 () 2 dξ 4lc B where ξ is the scaled time. The compressor and throttle characteristics are, respectively:
1 3
c (y) = ψ0 + H 1 + y − y3 2 2 √ −1 FT () = KT
(8.86)
The three states in the system are A, the scaled amplitude of the rotating stall cell; , the scaled annulus averaged mass flow; , the scaled annulus averaged pressure rise. The throttle parameter is KT . When viewed as a dynamical system, KT is a parameter and a classical bifurcation occurs at a critical value. When viewed as a control system, KT is the control input and a control bifurcation occurs at the same critical value. The other parameters ψ0 , H, B, α, lc , and W are constants. More details on the meaning of the variables and the parameters are discussed in References [5, 27]. We focus on the following equilibrium point for our discussion. It is actually the stall inception point of the compressor model.
A0 = 0,
0 = 2W,
0 = ψ0 + 2H,
KT0 = √
2W ψ0 + 2H
(8.87)
It is convenient to transfer the equilibrium point to the origin by the following change of coordinates
= φ + 2W,
= ψ + ψ0 + 2H,
KT = √
2W +u ψ0 + 2H
(8.88)
0882-Perruquetti-ch08_R2_170805
8.4
Examples of Normal Form
371
where, u is the new control input. The resulting system under the new coordinates (A, φ, ψ) has the following form 2 dA φ A 2 3αH = A 1− +1 − dξ 2W W 2W dφ 1 3HA2 φ φ −ψ − ψ0 − 2H + c = +1 − +1 dξ lc W 4W 2 W dψ 1 2W = ψ + ψ + 2H φ + 2W − + u √ 0 dξ 4lc B2 ψ0 + 2H
(8.89)
It is equivalent to dA 3αH φ2 A2 2φ = A − 2− − dξ 2W W W 4W 2 dφ 1 3H 2 H 3 3H 2 3H 2 = φ − A − φ − A φ (8.90) −ψ − dξ lc 2W 2 4W 2 2W 3 4W 3 dψ 1 2W = ψ + ψ0 + 2H + ψ + ψ0 + 2Hu φ + 2W − √ dξ 4lc B2 ψ0 + 2H The variables ψ and φ constitute the linearly controllable part. The normal form of the controllable part can be obtained by pushing down. Let
x0,1 = A, x1,2 =
1 lc
x1,1 = φ,
−ψ −
3H 2 H 3 3H 2 3H 2 φ − A − φ − A φ 2 2 3 2W 4W 2W 4W 3
(8.91)
The resulting system is dx0,1 3αH =− 2 dξ W
x0,1 x1,1 +
1 3 1 2 x + x0,1 x1,1 8W 0,1 2W
dx1,1 = x1,2 dξ dx1,2 = a(x0,1 , x1,1 , x1,2 ) + b(x0,1 , x1,1 , x1,2 )u dξ
(8.92)
0882-Perruquetti-ch08_R2_170805
372
Normal Forms of Nonlinear Control Systems
where a(x0,1 , x1,1 , x1,2 ) + b(x0,1 , x1,1 , x1,2 )u is defined by 1 3H dφ 3H dA dx1,2 dψ = − 2φ − A − dξ lc dξ W dξ 2W 2 dξ H 2 dφ 3H dA 2 dφ −3 − +A φ 2Aφ dξ dξ 2W 3 dξ 4W 3
(8.93)
If we define the new control input by v = a(x0,1 , x1,1 , x1,2 ) + b(x0,1 , x1,1 , x1,2 )u then we have dx0,1 3αH =− 2 dξ W
1 3 1 2 x + x0,1 x1,1 x0,1 x1,1 + 8W 0,1 2W
(8.94)
dx1,1 = x1,2 dξ
(8.95)
dx1,2 =v dξ In this system, the controllable part is in normal form. The dynamics of x0,1 is not linearly controllable. However, this equation is already in its normal form. So, (8.95) is the normal form of the engine compressor model (8.85). Although the feedback (8.94) is complicated, only the linear and quadratic parts of a and b are critical to the bifurcations of the system [19]. Their linear and quadratic Taylor expansions are a(x0,1 , x1,1 , x1,2 ) = −
8.4.3
−
W 4lc2 B2 (ψ0
+ 2H)
x1,2
−
3H 3H x2 − x2 16lc2 B2 W(ψ0 + 2H) 0,1 8lc2 B2 W(ψ0 + 2H) 1,1
−
3H W x1,1 x1,2 − x2 + O(x)3 2 2 lc W 16B (ψ0 + 2H)2 1,2
√ b(x0,1 , x1,1 , x1,2 ) =
1
x1,1 4lc2 B2
1 ψ0 + 2H x1,2 + O(x)2 − √ 2 2 2 4lc B 8lc B ψ0 + 2H
(8.96)
Controlled Lorenz Equation
It is known that circuit systems can be designed to approximate chaotic behavior such as the one exhibited by the Lorenz system. In References
0882-Perruquetti-ch08_R2_170805
8.4
Examples of Normal Form
373
[26, 35], the following controlled Lorenz equation is studied, x˙ = a(y − x) y˙ = cx − xz − y + u
(8.97)
z˙ = xy − bz where a, b, and c are constant numbers. It is shown [26, 35] that several state feedbacks exist under which the closed-loop system exhibit at least three fundamentally different chaos. In the following, we use a globally invertible transformation to derive the normal form of (8.97). As a result, the entire family of control systems with the same normal form has chaotic trajectories equivalent to those found earlier [26, 35]. The transformation is simple x1 = x x2 = a(y − x) x0 = z −
1 2 x 2a
(8.98)
v = a(cx − xz − y − ay + ax + u) Its inverse transformation is defined as follows x = x1 1 y = x1 + x2 a 1 z = x0 + x12 2a
(8.99)
1 1 1 u = (1 − c)x1 + 1 + x2 + x1 x0 + x13 + v a 2a a In (8.98), x is the same as x1 . The second equation in (8.98) is a push down. The transformation of x0 is a pull up to cancel the term (1/a)x1 x2 in the equation of x˙ 0 . Under this transformation, it is easy to check b x2 x˙ 0 = −bx0 + 1 − 2a 1 (8.100) x˙ 1 = x2 x˙ 2 = v It is in normal form, with only one nonzero invariant, the coefficient of x12 . If b = 0 and 2a, the equilibrium set of the system is a parabola. The system
0882-Perruquetti-ch08_R2_170805
374
Normal Forms of Nonlinear Control Systems
is linearly controllable at all its equilibrium points except for the origin. So, local control of such a system is relatively simple. However, its global behavior needs further study due to the chaotic behavior under certain state feedbacks.
8.5
Conclusions
In this chapter, normal forms of single input control systems are summarized. The system is nonlinear and the input is non-affine. The family of systems addressed in this chapter is the most general one relative to existing published normal forms of single input systems based on a similar approach. In addition, examples of normal forms are shown to illustrate the elementary transformation of push up and pull down in the derivation of normal forms. Owing to space limitation, applications of the normal forms are not addressed in the paper. However, interested readers are referred to the related publications in the references for results on bifurcation control, invariants, symmetries, and practical stabilization of nonlinear systems based on normal form approach.
References 1. V.I. Arnold, Geometrical Methods in the Theory of Ordinary Differential Equations, 2nd ed., Springer-Verlag, 1988. 2. J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Quadratic forms and feedback linearization in discrete time, Int. J. Control, 67, 567–586, 1997. 3. R.W. Brockett, Feedback invariants for nonlinear systems, in Proceedings of the IFAC Congress, Helsinki, 1978. 4. B. Charlet, J. Lévine, and R. Marino, On dynamic feedback linearization, Syst. Control Lett., 13, 143–152, 1989. 5. K.M. Eveker, D.L. Gysling, C.N. Nett, and O.P. Sharma, Integrated control of rotating stall and surge in aeroengines, Proc. SPIE, 2494 (21), 21–35, 1995. 6. O.E. Fitch, The control of bifurcations with engineering applications, Ph.D. Dissertation, U.S. Naval Postgraduate School, Monterey, California, 1997. 7. B. Hamzi, J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Nonlinear discretetime control of systems with a Naimark–Sacker bifurcation, Syst. Control Lett., 44, 245–258, 2001. 8. B. Hamzi, W. Kang, and J.-P. Barbot, Analysis and control of Hopf bifurcations, SIAM J. Control Optim., 42 (6), 2200–2220, 2004.
0882-Perruquetti-ch08_R2_170805
References
375
9. J. Hauser, S. Sastry, and P. Kokotovi´c, Nonlinear control via approximate input– output linearization: the ball and beam example, in Proceedings of the IEEE Conference on Decision and Control, Tampa, Florida, December, 1989. 10. B. Jakubczyk and W. Respondek, On linearization of control systems, Bull. Acad. Polon. Sci. Ser. Math., 28, 517–522, 1980. 11. L.R. Hunt and R. Su, Linear equivalents of nonlinear time varying systems, in Proceedings of the MTNS, Santa Monica, CA, 119–123, 1981. 12. W. Kang, Extended controller normal form, invariants and dynamic feedback linearization of nonlinear control systems, Disseration, University of California, Davis, California, 1991. 13. W. Kang and A.J. Krener, Extended quadratic controller normal form and dynamic feedback linearization of nonlinear systems, SIAM J. Control Optim., 30, 1319–1337, 1992. 14. W. Kang, Approximate linearization of nonlinear control systems, Syst. Control Lett., 23, 43–52, 1994. 15. W. Kang, Quadratic normal forms of nonlinear control systems with uncontrollable linearization, in Proceedings of the 34th IEEE CDC, 608–612, 1995. 16. W. Kang, Extended controller form and invariants of nonlinear control systems with a single input, J. Math. Syst., Estim. Control, 6, 27–51, 1996. 17. W. Kang, Bifurcation and normal form of nonlinear control systems: Part I, SIAM J. Control Optim., 36, 193–212, 1998. 18. W. Kang, Bifurcation and normal form of nonlinear control systems: Part II, SIAM J. Control Optim., 36, 213–232, 1998. 19. W. Kang, Bifurcation control via state feedback for systems with a single uncontrollable mode, SIAM J. Control Optim., 38, 1428–1452, 2000. 20. W. Kang, M. Xiao, and I. Tall, Controllability and local accessibility – a normal form approach, IEEE Trans. Autom. Control, 48 (10), 1724–1736, 2003. 21. A.J. Krener, Approximate linearization by state feedback and coordinate change, Syst. Control Lett., 5, 181–185, 1984. 22. A.J. Krener, Normal forms for linear and nonlinear systems, in Differential Geometry, the Interface Between Pure and Applied Mathematics, M. Luksik, C. Martin, and W. Shadwick (eds.), Contempary Mathematics, Vol. 68, American Mathematical Society, Providence, pp. 157–189, 1986. 23. A.J. Krener, S. Karahan, M. Hubbard, and R. Frezza, Higher order linear approximations to nonlinear control systems, in Proceedings of the IEEE Conference On Decision and Control, Los Angeles, pp. 519–523, 1987. 24. A.J. Krener and L. Li, Normal forms and bifurcations of discrete-time nonlinear control systems, SIAM J. Control Optim., 40, 1697–1723, 2002. 25. A.J. Krener, W. Kang, and D. Chang, Control bifurcations, IEEE Trans. Automat. Control, 49 (8), 1231–1246, 2004. 26. J. Lü and G. Chen, A new chaotic attractor coined, Int. J. Bifurcation Chaos, 12, 659–661, 2002. 27. F.E. McCaughan, Bifurcation analysis of axial flow compressor stability, SIAM J. Appl. Math., 20, 1232–1253, 1990. 28. W. Respondek and I.A. Tall, How many symmetries does admit a nonlinear single-input control system around an equilibrium?, in Proceedings of the 40th IEEE Conference on Decision and Control, Orlando, Florida, pp. 1795–1800, 2001.
0882-Perruquetti-ch08_R2_170805
376
Normal Forms of Nonlinear Control Systems
29. W. Respondek and I.A. Tall, Nonlinearizable single-input control systems do not admit stationary symmetries, Syst. Control Lett., 46, 1–16, 2002. 30. W. Respondek, Symmetries and minimal flat oputput of nonlinear control systems, in New Trends in Nonlinear Dynamics and Control, and Their Applications, W. Kang, M. Xiao, and C. Borges (eds.), Springer-Verlag, Berlin, 2003. 31. I. Tall and W. Respondek, Normal forms and invariants of nonlinear singleinput systems with noncontrollable linearization, in Proceedings of the IFAC Symposium on Nonlinear Control Systems, St. Petersburg, Russia, July, 2001. 32. I.A. Tall and W. Respondek, Normal forms of two-inputs nonlinear control systems, in Proceedings of the 41th CDC, Las Vegas, USA, 2002. 33. I. A. Tall, Normal forms of multi-inputs nonlinear systems with controllable linearization, in Lecture Notes in Control and Information Sciences, W. Kang, M. Xiao, and C. Borges (eds.), Springer-Verlag, Berlin, 2003. 34. I.A. Tall and W. Respondek, Feedback classification of nonlinear single-input control systems with controllable linearization: normal forms, canonical forms, and invariants, SIAM J. Control Optim., 41, 1498–1531, 2003. 35. T. Ueta and G. Chen, Bifurcation analysis of Chen’s equation, Int. J. Bifurcation Chaos, 10, 1917–1931, 2000.
0882-Perruquetti-ch09_R2_30805
9 Observability Bifurcations: Application to Cryptography
J.-P. Barbot, I. Belmouhoub, and L. Boutat-Baddas
CONTENTS 9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.2 Some Recalls on Observability . . . . . . . . . . . . . . . . . . . . 9.3 Observability Normal Form . . . . . . . . . . . . . . . . . . . . . . 9.3.1 Continuous Time Case . . . . . . . . . . . . . . . . . . . . 9.3.2 Discrete Time Case . . . . . . . . . . . . . . . . . . . . . . . 9.4 Unknown Input Observer . . . . . . . . . . . . . . . . . . . . . . . 9.5 Synchronization of Chaotic Systems . . . . . . . . . . . . . . . . 9.5.1 Continuous Time Transmission: The Chua Circuit 9.5.2 Discrete Time Transmission: Burger’s Map . . . . . 9.5.2.1 Ciphering . . . . . . . . . . . . . . . . . . . . . . . . 9.5.2.2 Deciphering . . . . . . . . . . . . . . . . . . . . . . 9.6 Rössler Map for Hyperchaotic Synchronization . . . . . . . 9.6.1 Step-by-Step Delayed Reconstructor Design . . . . 9.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.8 Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.8.1 Proof of Proposition 1 . . . . . . . . . . . . . . . . . . . . . 9.8.2 Proof of Theorem 2 . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.1
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . .
377 381 384 384 388 392 393 393 397 398 398 399 401 403 403 404 404 404 407
Introduction
This chapter deals with the use of the normal forms to analyze observability bifurcations. This concept of normal form was introduced in the 377
0882-Perruquetti-ch09_R2_30805
378
Observability Bifurcations
context of control theory by Kang and Krener [28]. Here, we present and use the normal form in order to analyze observability bifurcations (more precisely observability singularities manifolds) and then apply these to the design of chaotic ciphering and deciphering. Before dealing with this particular application, some basic notions on the system synchronization will be recalled. In a recent paper, Tauleigne et al. [56] have highlighted the difference between synchronization and syntonization (also called unidirectional synchronization in the literature [13]). More precisely, the syntonization is a special class of synchronization, where one system is the master and the other is the slave. The slave system must totally or partially reproduce the behavior of the master. The syntonization problem1 was very well defined as a problem of observer design by Nijmeijer and Mareels [43]. However, the case of bidirectional synchronization is more difficult to characterize using the usual concepts of control theory. To this purpose, consider the following two identical bidirectionally coupled systems shown in Figure 9.1. Choosing x1 = Vc1 , x2 = i1 , x3 = Vc2 , x4 = i2 as system state and taking C1 = C2 = C and L1 = L2 = L, the following state equations are obtained:
−1 CR 1 x˙ 1 x˙ 2 L = x˙ 3 1 x˙ 4 CR 0
−1 C
1 CR
0
0
0 0
−1 CR 1 L
0 x1 0 x2 −1 x3 x4 C 0
(9.1)
The state matrix in (9.1) has two purely imaginary eigenvalues and also two eigenvalues with negative real parts. Therefore, in this simple case, it is possible to predict the behavior of both bidirectionally coupled systems, only with eigenvalue and eigenvector arguments. In the directions of the purely imaginary eigenvalues, the system behavior is that of two synchronous oscillators. In the directions of the eigenvalues with negative real part the amplitude asymptotically goes to zero. Nevertheless, in order to emphasize the physical meaning, consider the following Lyapunov function: V=
1 1 L(x22 + x42 ) + C(x12 + x32 ) 2 2
(9.2)
1 In this chapter, the word synchronization refers to either a bidirectional synchronization or a syntonization (which can be viewed as a unidirectional synchronization).
0882-Perruquetti-ch09_R2_30805
9.1
Introduction
379
i2
i1 R
L1
C1
Vc1
Vc2
C2
L2
FIGURE 9.1 Bidirectional synchronization.
The derivative of V along the trajectories of (9.1) is −1 (x1 − x3 )2 V˙ = R
(9.3)
So the system (9.1) is proved to be Lyapunov stable [31]. To invoke the LaSalle theorem [31, 40], the set S of equi-Lyapunov is defined as: S = {x ∈ R4 /V˙ = 0}
(9.4)
For each bounded initial condition, all behaviors of (9.1) are guaranteed to be bounded according to (9.3). Therefore, all behaviors of (9.1) asymptotically converge to the invariant subset2 of S. Here , the invariant subset of S is: (9.5) IS = {x ∈ R4 /x1 = x3 and x2 = x4 } The set IS corresponds to all the perfectly synchronized behaviors of (9.1).3 Now, consider the unidirectional synchronization scheme shown in Figure 9.2. Setting again the same state vector x = (Vc1 , i1 , Vc2 , i2 ) and taking C1 = C2 = C and L1 = L2 = L, the following state equations are obtained: −1 0 0 0 C 1 x1 x˙ 1 0 0 0 x˙ 2 L x2 = (9.6) x3 x˙ 3 1 −1 −1 0 x˙ 4 CR C x4 CR 1 0 0 0 L 2 Subset invariant with respect to the system of bidirectionally coupled oscillators. 3 Condition x = x is obtained with V ¨ = 0. 2 4
0882-Perruquetti-ch09_R2_30805
380
Observability Bifurcations
i1 + – L1
C1
Vc1
R
i2 Vc2
Master
C2
L2
Slave
FIGURE 9.2 Unidirectional synchronization.
The state matrix has two purely imaginary eigenvalues and two eigenvalues with negative real parts. This second system (9.6) is also easy to analyze thanks to eigenvalues and eigenvectors arguments. In this case, however, some observability arguments can be used. The system (9.6) may be divided into two parts: the master dynamics (x1 and x2 ) and the slave (the observer) dynamics (x3 and x4 ). From linear control theory arguments, it can be proved that the master system with x1 as output is observable. Moreover, defining e1 = x1 − x3 and e2 = x2 − x4 as observation error on x1 and x2 , respectively, we obtain: −1 −1 CR C e˙1 e1 = (9.7) 1 e2 e˙2 0 L The system (9.7) has two eigenvalues with negative real parts. This very simple example highlights the interest of the observer approach in the case of unidirectional synchronization.4 The previous two examples seem to show that the analysis of the unidirectional synchronization is easier than that of the bidirectional one. Moreover, in the unidirectional synchronization case, only stability and observability bifurcation can appear and for bidirectional synchronization stability, observability and controllability bifurcation can appear. This chapter only deals with unidirectional synchronization. To improve the safety of data transmission, an unidirectional synchronization with at least one observability bifurcation is designed. Moreover, to deeply hide the message a new ciphering scheme is proposed. This new scheme will be referred to as an “inclusion method” [1, 5, 6, 10] in contrast to the classical one, the “addition method.”5 4 All generalizations starting from a particular case must be realized cautiously. 5 This method is also called chaotic masking in the literature [13].
0882-Perruquetti-ch09_R2_30805
9.2
Some Recalls on Observability
381
The loss of the linear observability property at one point or on a submanifold is called observability bifurcation. In many previous chapters, the notion of bifurcation was first dedicated to stability properties, and the concept of normal form was introduced to analyze the stability bifurcations [47]. The main idea behind this concept is to highlight the influences of the dominant terms with respect to a considered local property. Moreover, each normal form characterizes one and only one equivalent class. So, the structural properties of the normal form are also the same as those of each system in the corresponding equivalence class. Other works have also recalled the usefulness of normal form to analyze the controllability bifurcations [3, 18–20, 27, 28, 35, 36, 55]. In some recent papers [6, 10], we have introduced a new class of homogeneous transformations, by diffeomorphism and output injection, which is used to obtain an equivalence relation. Then normal form for each equivalence class can be chosen. All these works will be recalled subsequently in this chapter, and the fact that all systems of the same equivalence class have the same observability properties will be highlighted. Specifically, some observer design will be proposed on the basis of the normal form structure. Moreover, the concept of observability matching condition [45] will be recalled on the basis of the normal form structure to deal with the inclusion method. The last part of this chapter is dedicated to the synchronization of hyperchaotic systems [6]: as in some recent papers [5, 26, 42], we highlight the fact that the Pyragas conjecture6 [49] may be overcome and that the synchronization of hyperchaotic system is possible with only one output. Moreover, some observability bifurcations are added to improve the data transmission security in our discrete-time example.
9.2
Some Recalls on Observability
One of the first definitions and characterizations of nonlinear observability was given in the well-known paper of Hermann and Krener [22], where the concept of local weak observability was introduced and the observability rank condition was given. In their paper [22], observability and controllability were studied with the same tools as of differential geometry [41]. As with the linear case, some direct links between observability and controllability may be found. After this pioneering paper many works on nonlinear observability followed [8, 53]. An important fact, pointed out
6 The minimal number of outputs to synchronize two hyperchaotic systems is equal to the number of positive Lyapunov exponents of the master system.
0882-Perruquetti-ch09_R2_30805
382
Observability Bifurcations
in the 1980s, was the loss of observability due to an inappropriate input. Consequently, the characterization of appropriate input (universal input) with respect to nonlinear observability [16] was an important challenge. Since then, much research has been done on the design of nonlinear observers. From our point of view, one of the first significant theoretical and practical contributions to the subject was the linearization by output injection proposed by Krener and Isidori [37] for a single output system and by Krener and Respondek [38] for the multi-output case (see also Xia and Gao [60]). From these works and other ones dealing with structural analysis [7, 17, 24, 30, 46, 52], important work on nonlinear observer design followed. Different techniques were studied: high gain [17, 32], backstepping [29, 50], extended Luenberger [9], Lyapunov approach [57], sliding mode [4, 15, 45, 54, 61], numerical differentiator [14], etc. Some observer designs partially or totally use the notion of detectability. This concept will be used and highlighted in this paper in the context of observability bifurcation (see also the paper of Krener and Xiao [39]). In this section, we only recall concepts of weak observability, observability rank condition, and linearization by output injection. Consider the following system: x˙ = f (x),
y = h(x)
(9.8)
where vector fields f : Rn → Rn and h: Rn → Rm are assumed to be smooth with f (0) = 0 and h(0) = 0. The observability problem arises as follows: can we estimate the current state x(t) from past observations y(s), s ≤ t. An algorithm that solves this problem is called an observer. Before designing an observer for the system (9.8), we must check whether it verifies some conditions as it is weakly locally observable. The observability codistribution of the system (9.8) denoted dO, is the codistribution defined for x ∈ ⊂ Rn (with a neighborhood of an equilibrium point) by
DEFINITION 1
dhj
dLf hj 2 dLf hj dO(x) = .. . i dLf hj .. .
with j ∈ {1, . . . , m} and i ∈ N ∗
(9.9)
0882-Perruquetti-ch09_R2_30805
9.2
Some Recalls on Observability
383
The main theorem concerning weak local observability [22] is the following: THEOREM 1
Let dO be the observability codistribution associated to the system (9.8). If dim(dO(x)) = n
(9.10)
(9.8) is locally observable at x. REMARK 1 •
If (9.8) is a linear system, then we recover the classical rank condition.
•
If (9.8) is a non-autonomous system, then the observability codistribution depends on the input and the weak local observability also depends on the input (u) and their derivatives. The input which preserves the observability properties is called universal input [16].
Motivated by the consideration that it is always possible to cancel all independent parts constituted only by the input and the output in the estimated error, the observer linearization problem was born. Is it possible to find in a neighborhood U of 0 in Rn a change of state coordinates z = θ (x) such that dynamic (9.8) is linear driven by nonlinear output injection: z˙ = Az − β( y)
(9.11)
where β: Rm → Rn is a smooth vector field. Note that the output injection term β( y) is cancelled in the observation error dynamic for system (9.11). The diffeomorphism θ must satisfy the first-order partial differential equation: ∂θ (x)f (x) = Aθ (x) − β(h(x)) ∂x
(9.12)
Krener and Isidori showed [37] that equation (9.12) has a solution if and only if the following two conditions are satisfied: 1. The codistribution span {dh, dLf h, . . . , dLn−1 h} is of rank n at 0 f 2. [τ , adfk τ ] = 0 for all k = 1, 3, . . . , 2n − 1, where τ is the unique solution vector fields of [(dh)T , (dLf h)T , . . . , (dLn−1 h)T ]T τ = [0, 0, . . . , 1]T f REMARK 2 •
Condition 1 implies that linear tangent approximation is observable.
0882-Perruquetti-ch09_R2_30805
384
Observability Bifurcations
•
Generally, condition 2 is difficult to verify for noninvolutivity reason. As the noninvolutivity of a distribution implies its nonintegrability (see the Frobenius theorem [25, 44, 58]) Krener [34] introduced the concept of approximated integrability (see also [12, 21] for the same notion around a manifold) which is one of the key points of controllability and observability normal forms.
9.3
Observability Normal Form
In this section, we first present the normal for a system linearly observable; then we present the normal form for a system with one linear unobservable mode and these in both continuous and discrete-time case. For the sake of compactness, the proof of the main results is given in Appendix A.
9.3.1
Continuous Time Case
Consider a nonlinear single input single output (SISO) system: ξ˙ = f (ξ ) + g(ξ )u,
y = Cξ
(9.13)
where, vector fields f , g: U ⊂ Rn → Rn are assumed to be real analytic, such that f (0) = 0 and y ∈ R. Setting A = (∂f /∂ξ )(0) and B = g(0) around the equilibrium point ξe = 0, the system can be rewritten in the following form: z˙ = Az + Bu + f [2] (z) + g[1] (z)u + O[3] (z, u),
y = Cz
(9.14)
where f [2] (z) = [f1[2] (z), . . . , fn[2] (z)]T and g[1] (z) = [g1[1] (z), . . . , gn[1] (z)]T for all 1 ≤ i ≤ n, fi[2] (z) and gi[1] (z) are, respectively, homogeneous polynomials of degree 2 and 1 in z. DEFINITION 2
1. The component f [2] (z) + g[1] (z)u is the quadratic part of system (9.14). 2. Consider a second system: x˙ = Ax + Bu + f¯ [2] (x) + g¯ [1] (x)u + O[3] (x, u),
y = Cx
(9.15)
We say that system (9.14) whose quadratic part is f [2] (z) + g[1] (z)u, is QEMOI (Quadratically Equivalent Modulo an Output Injection) to
0882-Perruquetti-ch09_R2_30805
9.3
Observability Normal Form
385
system (9.15) whose quadratic part is f¯ [2] (x) + g¯ [1] (x)u, if there exists an output injection: β [2] ( y) + γ [1] ( y)u
(9.16)
and a diffeomorphism of the form: x = z − [2] (z)
(9.17)
which carries f [2] (z) + g[1] (z)u to f¯ [2] (x) + g¯ [1] (x)u + [β [2] ( y) + [2] [2] T [2] γ [1] ( y)u]. Here [2] (z) = [[2] 1 (z), . . . , n (z)] , β ( y) = [β1 ( y), . . . , [2] [2] [2] βn ( y)]T and for all 1 ≤ i ≤ n, i (z) and β1 ( y) are homogeneous polynomials of degree 2 in, respectively, z and y and γ [1] ( y) = [γ1[1] ( y), . . . , γn[1] ( y)]T where γi[1] ( y) is a homogeneous polynomial of degree 1 in y. 3. If f¯ [2] (x) = 0 and g¯ [1] (x) = 0, we say that system (9.14) is quadratically linearizable modulo an output injection. REMARK 3 •
If ((∂f /∂x)(0), C) is observable, then one can transform system (9.13) to the following form:
z˙˜ = Ao z + Bo u + f [2] (z) + g[1] (z)u + O[3] (z, u) y = z1 = Co z
a1 a2 .. .
with: Ao = an−1 an
•
1 0 0 0 0
0 1 .. .
··· ···
··· 0 .. . 0 ···
0 · · · , 0 1 0
(9.18)
b1 .. . Bo = ... . ..
bn If ((∂f /∂x)(0), C) has one unobservable real mode, then one can transform system (9.13) to the following form: ˙ ˜ [2] ˜ [1] (z)u + O[3] (z, u) obs u + f (z) + g z˜ = Aobs z˜ + B n−1 z˙ n = αn zn + i=1 αi zi + bn u + fn[2] (z) + gn[1] (z)u + O[3] (z, u) y = z1 = Cobs z˜ (9.19)
0882-Perruquetti-ch09_R2_30805
386
Observability Bifurcations with: z˜ =
z1 .. . .. . .. .
,
z = [˜zT , zn ]T ,
zn−1
Aobs
a1
a 2 = ... an−2 an−1
1
0
···
0 0
1 .. .
0 .. .
0
···
0
0
···
···
0
· · · , 0 1 0
Bobs
=
b1 .. . .. . .. .
bn−1
Throughout the chapter, the output is always taken to be equal to the first state component. Consequently, the diffeomorphism (x = z − [2] (z)) is such that [2] 1 (z) = 0. PROPOSITION 1 [10]
System (9.14) is QEMOI to system (9.15), if and only if the following two homological equations are satisfied:
1. A[2] (z) −
∂[2] [2] Az = f (z) − f [2] (z) + β [2] (z1 ) ∂z
∂[2] 2. − B = g¯ [1] (z) − g[1] (z) + γ [1] (z1 ) ∂z
(9.20)
[2] [2] T where (∂[2] /∂z)Az := (∂[2] 1 (z)/∂z)Az, . . . ,(∂n (z)/∂zAz) and ∂i (z)/∂z is the Jacobian matrix of [2] i (z) for all 1 ≤ i ≤ n.
The proof of this proposition is presented in the appendix. Now we can give the normal form associated to QEMOI relation. First, we recall the theorem introduced in Reference [10] for a system which is linearly observable.
0882-Perruquetti-ch09_R2_30805
9.3
Observability Normal Form
387
THEOREM 2
There is a quadratic diffeomorphism and an output injection which transform system (9.18) in the following observability normal form:
x˙ 1 .. .
x˙ n−1 x˙ n−1
= a1 x1 + x2 + b1 u + ni=2 k1i xi u + O[3] (x, u) .. .. . . = an−1 x1 + xn + bn−1 u + ni=2 k(n−2)i xi u + O[3] (x, u) = an x1 + bn u + nj≥i=2 hij xi xj + h1n x1 xn n + i=2 k(n−1)i xi u + O[3] (x, u)
(9.21)
The proof is reported in the appendix. COROLLARY 1
There is a quadratic diffeomorphism and an output injection which transform system (9.19) in the following observability normal form: x˙ 1 = a1 x1 + x2 + b1 u + ni=2 k1i xi u + O[3] (x, u) .. .. .. . . . x˙ n−2 = an−2 x1 + xn−1 + bn−2 u + ni=2 k(n−2)i xi u + O[3] (x, u) x˙ n−1 = an−1 x1 + bn−1 u + nj≥i=2 hij xi xj + h1n x1 xn + ni=2 k(n−1)i xi u + O[3] (x, u) n−1 [2] [2] x˙ n = αn xn + n−1 i=1 αi xi + bn u + αn n (x) + i=1 αi i (x) ∂[2] n Aobs x˜ + fn[2] (x) + ni=2 kni xi u + O[3] (x, u) − ∂ x˜
(9.22)
The proof is similar to the previous one, for more details, see Reference [10]. REMARK 4
1. If, for some index i ∈ [1, n] we have hin xi = 0, then we can recover, at least locally, all state components. 2. If we have some kin = 0 then with an appropriate choice of input u (universal input [16]) we can have quadratic observability. 3. Thus, the local quadratic observability is principally given by the dynamic x˙ n−1 . In the case where conditions 1 and 2 are not verified, then we can use coefficient αn to study the detectability propriety. Then, we have three cases: (a) If αn < 0 then the state xn is detectable (b) If αn > 0 then xn is unstable, and consequently undetectable
0882-Perruquetti-ch09_R2_30805
388
Observability Bifurcations (c) If αn = 0 we can use the center manifold theory to analyze stability or instability of xn and consequently its detectability or undetectability.
Remembering the well-known Poncaré–Dulac theorem7 it is expected that resonant terms may appear, then we have: If [2] n (x) verifies the following equation: αn [2] n (x) +
n−1
αi [2] i (x) =
i=1
∂[2] n Aobs x − fn[2] (x) + βn[2] (x1 ) ∂x
(9.23)
then quadratic terms in x˙ n are cancelled, which is not the case, in general, for arbitrary αn and ai . Nevertheless, this condition is less restrictive than the usual one, thanks to the output injection βn[2] (x1 ).
9.3.2
Discrete Time Case
Now, let us consider a discrete time nonlinear SISO system: ξ + = f (ξ , u),
y = Cξ
(9.24)
where, ξ is the state of the system and ξ (resp. ξ + ) denote ξ(k) (resp. ξ(k + 1)). The vector field f : U ⊂ Rn+1 → Rn and the function h: M ⊂ Rn → R are assumed to be real analytic, such that f (0, 0) = 0. As for the continuous time case, we recall the observability normal form for a linear observable system and for a system with one linear unobservable mode. We apply, as usual, a second-order Taylor expansion around the equilibrium point. Thus the system is rewritten as:
z+ = Az + Bu + F[2] (z) + g[1] (z)u + γ [0] u2 + O3 (z, u) y = Cz
(9.25)
with A = (∂f /∂x)(0, 0), B = (∂f /∂u)(0, 0) and where: F[2] (z) = [F1[2] (z), . . . , Fn[2] (z)]T and g[1] (z) = [g1[1] (z), . . . , gn[1] (z)]T . Now, we define the QEMOI for a discrete time system given by (9.25). 7 The condition for resonance is: there exists an eigenvalue L such that L = n m L with i i j=1 j j mj ∈ N and nj=1 mj ≥ 2 [59].
0882-Perruquetti-ch09_R2_30805
9.3
Observability Normal Form
DEFINITION 3
389
The system:
z+ = Az + Bu + F[2] (z) + g[1] (z)u + γ [0] u2 + O3 (z, u),
y = Cz
(9.26)
is said to be quadratically equivalent to the system: + [2] [1] [0] 2 x = Ax + Bu + F¯ (x) + g¯ (x)u + γ¯ u [2] [1] [0] 2 + β ( y) + α ( y)u + τ u + O3 (x, u) y = Cx
(9.27)
modulo the output injection: β [2] ( y) + α [1] ( y)u + τ [0] u2
(9.28)
if there exists a diffeomorphism of the form: x = z − [2] (z)
(9.29)
which transforms the quadratic part of (9.26) into the one of (9.27). REMARK 5
The output injection (9.28) is different from the one defined in (9.16) for the continuous-time case. This is due to the fact that the vector field composition does not preserve the linearity in “u”; so we have to consider the term τ [0] u2 in (9.28). In the next proposition, we give the necessary and sufficient conditions for QEMOI: PROPOSITION 1
System (9.26) is QEMOI to system (9.27), if and only if there exist ([2] , β [2] , α [1] , γ [0] ) which satisfy the following homological equations: (i) F[2] (x) − F¯ [2] (x) = [2] (Ax) − A[2] (x) + β [2] (x1 ) [2] (Ax, B) + α [1] (x1 ) (ii) g[1] (x) − g¯ [1] (x) = (iii) γ [0] − γ¯ [0] = [2] (B) + τ [0] Proof of Proposition 1 is the same as that of Proposition 1 in continuous time case but with some additional technical difficulties due to the composition operator; see Reference [6] for complete proof.
0882-Perruquetti-ch09_R2_30805
390
Observability Bifurcations
Now, to apply our study to a system linearly observable and a system with one unobservable mode, let us consider: •
The system (9.13) where the pair (A, C) is observable. Then there is a linear change of coordinates (z = Tξ ) and a Taylor expansion which transforms the system (9.13) into the following form:
z+ = Ao z + Bo u + F[2] (z) + g[1] (z)u + γ [0] u2 + O3 y = z1 = Co z
(9.30)
where Ao , Bo , and Co are as defined in (9.18). •
The system (9.13) where the pair (A, C) has one unobservable mode. Then there is a linear change of coordinates (z = Tξ ) and a Taylor expansion which transforms the system (9.13) into the following form: + [1] [0] 2 3 ˜ [2] z˜ = Aobs z˜ + Bobs u + F (z) + g˜ (z)u + γ˜ u + O [2] [1] [0] 2 3 zn+ = ηzn + n−1 i=1 λi zi + bn u + Fn (z) + gn (z)u + γn u + O y=C z obs (9.31) where Aobs , Bobs , and Cobs are as defined in (9.19).
The quadratic normal form associated with system (9.30) is given in the following theorem. THEOREM 3
The discrete time observability normal form with respect to the quadratic equivalence modulo an output injection of the system (9.30) is: + x1 .. . + x n−1 + xn
= a1 x1 + x2 + b1 u + ni=2 k1i xi u .. .. . . = an−1 x1 + xn + bn−1 u + ni=2 k(n−2)i xi u n = an x1 + bn u + nj>i=1 hij xi xj + hnn xn2 + i=2 kni xi u
(9.32)
Proof of the theorem can be found in Reference [6]. The following corollary is given for system with one linearly unobservable mode.
0882-Perruquetti-ch09_R2_30805
9.3
Observability Normal Form
391
COROLLARY 2
The discrete time observability normal form with respect to the quadratic equivalence modulo an output injection of the system (9.31) is: + x1 = a1 x1 + x2 + b1 u + ni=2 k1i xi u .. .. .. . . . + u + ni=2 k(n−2)i xi u xn−2 = an−2 x1 + xn−1 + bn−2 n + xn−1 = an−1 x1 + bn−1 u + nj>i=1 hij xi xj + hnn xn2 + i=2 ki(n−1) xi u (9.33) Moreover, for the linear unobservable mode the general dynamic is: n n−1 + (9.34) λ i xi + b n u + lij xi xj + kni xi u xn = ηxn + (i,j)∈I, j=1
i=1
i=2
(This last dynamic may be simplified in some particular cases, see Reference [6].) For the proof, see Reference [6]. REMARK 6 •
The normal form (9.33) is structurally different from the controllability discrete time normal form, given in References [18, 19], in the last state dynamic xn+ . For the observability analysis, the main structural information is not in the xn+ dynamic but in the previous state evolution xi+ for n − 1 ≥ i ≥ 1 . The terms λi xi , bn u, Fn[2] (x), gn[1] (x)u are only important in the case of detectability analysis when η = ±1.
•
Thanks to the quadratic term kn(n−1) xn u in the normal form described earlier, it is possible to restore observability with a well chosen input u.
•
In the normal form, let us consider more closely the observability singularity’s (here we consider system without input) by isolating the terms in xn which appear in the (n − 1)th line, as follows: n n−1 hij xi xj + hin xi xn (9.35) j>i=1
i=1
we can deduce the manifold of local unobservability : n−1 hin xi + 2hnn xn = 0 . Sn = i=1
0882-Perruquetti-ch09_R2_30805
392
9.4
Observability Bifurcations
Unknown Input Observer
The observer design for a system with unknown input has been studied [23, 61] and numerous relevant applications of such approaches have been given. In this chapter, we propose to find a new application domain for the unknown input observer design. More precisely, we propose a new type of secure data transmission based on chaotic synchronization. For this we have to recall and give some particular concepts of an observer for a system with unknown input. Roughly speaking, in a linear context, the problem of observer design for a system with unknown input is solved as follows: Assume an observable system with two outputs and one unknown input such that at least one derivative of the output is a function of the unknown input (i.e. C1 G or C2 G different from zero), x˙ = Ax + Bu + Gω,
y1 = C1 x,
y2 = C2 x
Then to design an observer, we choose a new output as ynew = φ(y1 , y2 ) and find observation error dynamics which are orthogonal to the unknown input vector. Unfortunately, this kind of design cannot be applied to a system with only one output (the case considered in this chapter). Nevertheless, it is possible with a step by step procedure to design an observer for such a system. Obviously, there are some restrictive conditions on the system allowing to solve this problem [45, 61]. Now, let us consider the nonlinear analytic system: x˙ = f (x) + g(x)u,
y = h(x)
(9.36)
where vector fields f and g: Rn → Rn and h : Rn → Rm are assumed to be smooth with f (0) = 0 and h(0) = 0. Now, we can give a particular constraint to solve this problem. The unknown input observer design is solvable locally around x = 0 for system (9.36) if: •
span{dh, dLf h, . . . , dLn−1 h} is of rank n at x = 0 f
•
((dh)T (dLf h)T · · · (dLn−1 h)T )T g = (0 · · · 0 )T (observability matching f condition, OMC )
means a non-null term almost everywhere in the neighborhood of x = 0. h, we have Sketch of proof : Setting z1 = h, z2 = Lf h, . . . , zn = Ln−1 f z˙ 1 = z2 ,
z˙ 2 = z3 , . . . , z˙ n−1 = zn ,
z˙ n = f˜ (z) + g˜ (z)u
(9.37)
0882-Perruquetti-ch09_R2_30805
9.5
Synchronization of Chaotic Systems
393
Then under classical boundary assumptions, it is possible to design a step by step sliding mode observer for the system (9.37) such that we recover, in finite time, all state components and the unknown input. DEFINITION 4
The discrete time observability matching condition
(DOMC) is:
((dh)T (df ◦ h)T · · · (dfon−1 ◦ h)T )T
g = (0 · · · 0 )T
j
where ◦ denotes the usual composition function and f◦ denotes the function f composed j times.
9.5
Synchronization of Chaotic Systems
We now propose a new encoding algorithm based on a chaotic system synchronization but for which we also have an observability bifurcation. In both continuous and discrete time cases, the message is included in the system structure and the observability matching condition is required. Then the general transmission scheme for the inclusion method8 is as shown in Figure 9.3. The inclusion method must be compared with the classical one, the socalled addition method (Figure 9.4), which is also a slave–master scheme but where the message is only masked by the chaotic signal and included in the structure of the chaotic system.
9.5.1
Continuous Time Transmission: The Chua Circuit
To illustrate our purpose, consider the well-known Chua circuit with a variable inductor (see Figure 9.5). The circuit contains linear resistors (R, R0 ), a single nonlinear resistor (f (v1 )), and three linear energy-storage elements: a variable inductor (L) and two capacitors (C1 , C2 ). The state equations for
8 The problem of recovering the message in the inclusion method may be interpreted as a left invertible problem.
0882-Perruquetti-ch09_R2_30805
394
Observability Bifurcations
Message: M
Chaotic system: Transmitter
Transmission Line
Chaotic system: Receiver
Message emitted M
FIGURE 9.3 Inclusion method.
the circuit are as follows: x˙ 1 =
f (x1 ) −1 (x1 − x2 ) + C1 R C1
x˙ 2 =
x3 1 (x1 − x2 ) + C2 R C2
(9.38)
x˙ 3 = −x4 (x2 + R0 x3 ) x˙ 4 = σ with: y = x1 = v1 , x2 = v2 , x3 = i3 , x4 = 1/L(t), x = (x1 , x2 , x3 , x4 )T , and f (x1 ) = Gb x1 + 0.5(Ga − Gb )(|x1 + E| − |x1 − E|). Moreover x1 is the output and x4 = 1/L is the only state component directly influenced by σ , an unknown bounded function. The variation of L is the information to pass on the receiver. Moreover, we assume that there exist K1 and K2 such that |x4 | < K1 and |dx4 /dt| < K2 , this means that the information signal and its variation are bounded. This system has one unobservable real mode, and using the linear change of coordinates z1 = x1 , z2 = (x1 /C2 R) + (x2 /C1 R), z3 = (x3 /C1 C2 R), and
Message Message "BONJOUR" "BONJOUR"
Message Message "BONJOUR " "BONJOUR"
–Chaotic generator
++
Public Channel
Transmitter Chaotic signal
Chaotic Chaotic generator
Receiver Chaotic signal
FIGURE 9.4 Addition method.
0882-Perruquetti-ch09_R2_30805
9.5
Synchronization of Chaotic Systems R0
L
i3
C2
395 f(v1)
R V2
V1
C1
f(v1)
Gb Ga –B p
V1
Bp Gb
FIGURE 9.5 The Chua circuit.
z4 = x4 we obtain: z˙ 1 =
−(C1 + C2 ) f (x1 ) z1 + z 2 + C1 C2 R C1
f (x1 ) C1 C2 R z 1 z4 z 2 z4 z˙ 3 = 2 − − R 0 z3 z4 C2 C2 R
z˙ 2 = z3 +
(9.39)
z˙ 4 = σ Equations (9.39) are in observability normal form [10] with α = 0 and resonant terms are h22 = h23 = 0, h14 = 1/C22 R, h24 = 1/C2 , and h34 = −R0 . Moreover, the system verifies the OMC [2, 61] with respect to σ and as nonsmooth output injection ( f (x1 )/C1 , f (x1 )/(C1 C2 R), 0, 0)T . From the normal form (9.39) we conclude that the observability singularity manifold is M0 = {z(z1 /(C22 R)) − (z2 /C2 ) − R0 z3 = 0}. Taking into account this singularity, it is possible to design the following step by step sliding mode observer (given here in the original coordinate): xˆ 2 − y − f ( y) + λ1 sign( y − xˆ 1 ) R dˆx2 1 y − x˜ 2 = + xˆ 3 + E1 λ2 sign(˜x2 − xˆ 2 ) dt C2 R
1 dˆx1 = dt C1
(9.40)
dˆx3 = xˆ 4 (−˜x2 − R0 x˜ 3 ) + E2 λ3 sign(˜x3 − xˆ 3 ) dt dˆx4 = E3 λ4 sign(˜x4 − xˆ 4 ) dt with the following conditions: if xˆ 1 = x1 then E1 = 1 else E1 = 0, similarly if [ˆx2 = x˜ 2 and E1 = 1] then E2 = 1 else E2 = 0 and finally if [ˆx3 = x˜ 3 and E2 = 1] then E3 = 1 else E3 = 0. Moreover, to take into account the observability
0882-Perruquetti-ch09_R2_30805
396
Observability Bifurcations
singularity manifold M0 , (˜x2 + R0 x˜ 3 = 0), we set Es = 1 if x˜ 2 + R0 x˜ 3 = 0 else Es = 0. And by definition we take: x˜ 2 = xˆ 2 + E1 C1 Rλ1 sign( y − xˆ 1 ) x˜ 3 = xˆ 3 + E2 C2 λ2 sign(˜x2 − xˆ2 )
(9.41)
E3 Es λ3 sign(˜x3 − xˆ 3 ) x˜ 4 = xˆ 4 − (˜x2 + R0 x˜ 3 − 1 + Es )) Then the observation error dynamics (e = x − xˆ ) are: de1 e2 = − λ1 sign(x1 − xˆ 1 ) dt C1 R de2 e3 = − λ2 sign(x2 − xˆ 2 ) dt C2 de3 = −(x2 + R0 x3 )e4 − λ3 sign(x3 − xˆ 3 ) dt de4 = σ − Es λ4 sign(˜x4 − xˆ 4 ) dt
(9.42)
The proof of observation error convergence is in Reference [11]. REMARK 7
In practice, we add some low pass filter on the auxiliary components x˜ i and we set Ei = 1 for i ∈ {1, 2, 3}, not exactly when we are on the sliding manifold but when we are close enough. Similarly, Es = 0 when we are close to the singularity, not only when we are on it. To illustrate the efficiency of the method, we chose to transmit the following message: 0.1 sin (100t) . The message was introduced in the Chua circuit as follows: L (t) = L + 0.1L sin(100t) with: L = 18.8 mH. In Figure 9.6, if we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ), for a long time we lose the information on x4 . We notice that the convergence of the state xˆ 4 of the observer, towards x4 of the system of origin (9.38), depends on the choice of Es (see first two curves of Figure 9.6). To have good convergence it is necessary to take Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ), as we can notice in the last two curves of Figure 9.6. In any case, these simulations confirm that the resonant terms (−x4 x2 − R0 x4 x3 ) = 0 allow us to obtain the message.
0882-Perruquetti-ch09_R2_30805
9.5
Synchronization of Chaotic Systems
397
1 Es Singularity 0 –1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
53.2 x4obs x4 53.19 53.18
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
1 Es Singularity 0 –1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
53.2 x4obs x4 53.19 53.18
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
FIGURE 9.6 Observation errors.
9.5.2
Discrete Time Transmission: Burger’s Map
Information is getting more and more digitized, treated, and exchanged by computers nowadays; thus we think it is of primary importance to study systems in discrete time. Here, we study the following discrete time chaotic system called the Burger map [33]:
x1+ = (1 + a)x1 + x1 x2 x2+ = (1 − b)x2 − x12
(9.43)
where a and b are two real parameters. We assume that we can measure the state x1 , so we have y = x1 as the output of the system. This system is the normal form of:
z1+ = (1 + a)z1 + z1 z2 z2+ = (1 − b)(z2 + bz1 z2 ) − z12
(9.44)
0882-Perruquetti-ch09_R2_30805
398
Observability Bifurcations
obtained, modulo (−y2 ), by applying to it the change of coordinates x = z − [2] [2] (z); where the diffeomorphism [2] is: [2] 1 (z) = 0 and 2 (z) = z1 z2 . 9.5.2.1 Ciphering Now consider the Burger’s map, and let m be the confidential message. Moreover, only the output y = x1 is transmitted to the receiver via a public channel. Then, the transmitter will have the form:
x1+ = (1 + a)x1 + x1 x2 x2+ = (1 − b)x2 − x12 + m
(9.45)
The key of this secure communication consists in the knowledge of the parameters a and b. The fact that the message should be the last information to reach in the system constitutes a necessary and sufficient condition to recover the message by the construction of a suitable observer. It is the so-called DOMC.
9.5.2.2 Deciphering To decipher the message we construct the observer:
xˆ 1+ = (1 + b)y + yxˆ 2 xˆ 2+ = (1 − a)ˆx2 − y2
(9.46)
The observer design consists in recovering the linearly unobservable states (i.e., x2 ) in the observer, with the knowledge of y: x2 recovering: For the sake of causality, we extract x2 from e1 , at the iteration (k − 1), which we approximate by x˜ 2− ; so x˜ 2− = e1 /y− , for y = 0. Consequently, when y = 0 this leads to a singularity. However, we overcome this problem by forcing x˜ 2 to take its last remembered value when y = 0. Correction of xˆ 2− : By correction, we mean to replace xˆ 2 by x˜ 2 in the prediction equation of xˆ 2 , then we have: xˆ 2−C = (1 − b)˜x2− − − ( y− − )2 . The message m recovering: We have x2− = x˜ 2− = (1 − b)˜x2− − − ( y− − )2 + m− − . It is now possible to extract m with two delays from e˜2 as: e˜2− = x˜ 2− − xˆ 2−C = m− − . Which means that e˜2 (k − 1) = m(k − 2). So we have to wait two steps (these correspond to the necessary steps of the synchronization).
0882-Perruquetti-ch09_R2_30805
9.6
Rössler Map for Hyperchaotic Synchronization
9.6
Rössler Map for Hyperchaotic Synchronization
399
To further improve the transmission security, we use hyperchaotic systems which features offer more guaranties for communications security. For that reason the inclusion method was adapted for hyperchaotic systems, from which results the “discrete time hyperchaotic-cryptography by inclusion method” (DTHCIM). In this section, we present the DTHCIM for a three-dimensional discrete time hyperchaotic system (see the behavior of the Rossler map in Figure 9.7) introduced by Rössler [51]: + x1 = a1 x1 (1 − x1 ) + a2 x2 x2+ = b1 [(1 − b2 x1 )(x2 + b3 ) − 1] (1 − b4 x3 ) + x3 = c1 x3 (1 − x3 ) − c2 (1 − b2 x1 )(x2 + b3 )
(9.47)
System (9.47) can be represented in the generic form: x+ := f (x, p)
(9.48)
where x := (x1 , x2 , x3 )T ∈ 3 represents the state vector evaluated at step k (i.e., x(k)), so x+ = x(k + 1). The vector p ∈ 8 denotes the parameter vectors of system (9.47), p = (a1 , a2 , b1 , b2 , b3 , b4 , c1 , c2 )T . Let us define f (x, p) := ( f1 (x1 , x2 , p), f2 (x1 , x2 , x3 , p), f3 (x1 , x2 , x3 , p))T such that f : 3 × 8 → 3 is the analytic hyperchaotic generator of (9.47). The Rössler map possesses six stationary points with four complex and two real points and has at least two positive Lyapunov exponents for
FIGURE 9.7 Rossler map phase portrait.
0882-Perruquetti-ch09_R2_30805
400
Observability Bifurcations
each real point. Starting from the hyperchaotic generator (9.48), a secured transmission scheme is constructed. The secret key is made up of part or totality of the hyperchaotic system parameters. In this case, we consider the parameter vector (a2 , b1 , b4 )T as a key. The transmitter is represented by:
x+ = f (x, p) + g(x, p)u y = h(x)
(9.49)
where x, p and vector-field f are as defined in (9.48). Vector field h: 3 → is such that h(x) = x1 , and vector field g : 3 × 8 → 3 will be specified next. We recall that input u ∈ is the confidential information to transmit. Hence, system (9.49) is considered to be a SISO system with u as unknown input and x1 as the output. So, following DOMC we hide the confidential message u in the third dynamic x3+ of the transmitter (i.e., g(x, p) = (0, 0, 1)T ). This ensures recovering the message almost everywhere. It will be proved next that for such injection the DOMC holds. The first point of the DOMC to be verified is whether the observation matrix J is of rank 3 almost everywhere. So, we have: det(J) = −a22 b1 b4 [(1 − b2 x1 )(x2 + b3 ) − 1] It ensues that det(J) = 0 for all x ∈ 3 /S such that a2 , b1 , and b4 are non-null. Where singularity manifold S is given by: S = {x ∈ 3
such that osg := (1 − b2 x1 )(x2 + b3 ) − 1 = 0}
So, the matrix J is of rank 3 everywhere except for S. We conclude that system (9.49) is, at least almost everywhere, non-linearly observable. However, it possesses, for x ∈ S, one observability singularity in x3 direction. As for the second condition, a matrix–vector product is computed: J · g = ((dh)T , (d( f ◦ h))T , (d( fo2 ◦ h))T )T g = (0, 0, −a2 b1 b4 osg)T We deduce that J · g = (0, 0, )T , where is a non-null function of x ∈ 3 /S. For x ∈ S, J · g = (0, 0, 0)T . Consequently, through the bifurcation manifold S, there is a temporary loss of information. The message u cannot be
0882-Perruquetti-ch09_R2_30805
9.6
Rössler Map for Hyperchaotic Synchronization
401
recovered each time the system trajectory interacts with the bifurcation manifold. This problem is bypassed by stopping the emission of the confidential information each time an observability bifurcation is detected and by emitting any data instead. An original manner for data encryption was proposed, but the main task still is the decryption. For this purpose, a “step-by-step delayed reconstructor” is developed to recover all information.
9.6.1
Step-by-Step Delayed Reconstructor Design
To realize the decryption, the receiver is designed as a decision and control bloc (see Figrue 9.3), able to reconstruct the original data: the “step-by-step delayed reconstructor”. The message u is reconstructed in three steps and with three delays, from the delayed output and the delayed reconstructed dynamics of the transmitter. REMARK 8
For convenience, we use the following notations: 1. x˜ i denotes the transmitter reconstructed dynamic: xi for 1 ≤ i ≤ n (here n = 3). 2. ∀k ∈ ℵ, (xi )j− = xi (k − j), (˜xl )j− = x˜ l (k − j), yj− = y(k − j) and uj− denotes u(k − j) for 1 ≤ i, j ≤ n and 2 ≤ l ≤ n. The step-by-step delayed reconstructor, consists in constructing step by step, transmitter dynamics with some delays, such that each reconstructed dynamic at the kth iteration arises in the construction of the next dynamic at the (k − 1)th iteration until the last one, which contains information at the (k − 3)th iteration. This explains why the information u3− is extracted instead of u. So the reconstructor structure can be assimilated as a “go-back machine”. In each iteration k, we extract u(k − 3) as follows: First step: Consists computing the second dynamic of the delayed reconstructor with the knowledge of the transmitter output y uniquely. It is obtained by a simple inversion: x˜ 2− = (y − a1 y− (1 − y− )/a2 . Second step: This step consists in finding the third delayed reconstructor dynamics. In this step are the constructed delayed dynamics: x˜ 2− and (˜x2 )2− and the delayed output y2− . This reconstruction points out the observability bifurcation highlighted in the previous observability study: (osg)2− = (1 − b2 y2− )((˜x2 )2− + b3 ) − 1.
0882-Perruquetti-ch09_R2_30805
402
Observability Bifurcations 1
0.5
0
−0.5
−1
−1.5
−2
0
1
2
3
4
5
6
7
8
9
FIGURE 9.8 Three steps convergence of signal observation error.
This singularity is bypassed by forcing (˜x3 )2− to take its last buffered value when x˜ 2− ∈ S: − 2− b1 (osg) − x˜ 2 for x˜ 2− ∈ 3 /S (˜x3 )2− = b1 b4 (osg)2− (˜x )3− for x˜ 2− ∈ S 3 Last step: After the reconstruction of the last dynamic, the message (a square signal of amplitude 10−2 ) is extracted with three delays (see Figure 9.8) by a simple differentiation under the knowledge of delayed dynamics (˜x3 )2− , (˜x3 )3− , (˜x2 )3− constructed in the previous steps and the delayed output y3− : u3− = (˜x3 )2− − c1 (˜x3 )3− (1 − (˜x3 )3− ) + c2 (1 − b2 y3− )((˜x2 )3− + b3 ) For simulations we have: p = (a1 , a2 , b1 , b2 , b3 , b4 , c1 , c2 )T = (3.78, 0.2, 0.1, 2, 0.35, 1.9, 3.8, 0.05)T
0882-Perruquetti-ch09_R2_30805
9.7
Conclusions
403
REMARK 9
The secured transmission techniques (based on chaotic synchronization) until now [48] are based on an “output injection scheme,” under the assumption of linear-observability of the hyperchaotic generator. This induces the necessity to transmit as many nonlinearities as Lyapounov exponents (at least two nonlinearities in the hyperchaotic case). The cryptographic scheme developed earlier, answers the aforementioned issue. In fact, it is based on an observable hyperchaotic map which is linearly unobservable. Moreover, on the transmission line, only one information materialized by the output of the transmitter is found.
9.7
Conclusions
In this chapter, we have first dealt with the observability bifurcation and the normal form associated with the observability properties. After that, we have highlighted the usefulness of the observability normal form for designing a secure data transmission by unidirectional synchronization of two chaotic systems. Moreover, using the concept of observers with unknown input and the so-called observer matching condition the inclusion method was recalled. This method is a ciphering method where the message is included in the structure of the chaotic transmitter. Finally, in the discrete time case, for systems that may have an observability bifurcation of dimension greater than one, we have proposed a new discrete time observer design. The proposed design requires some specific conditions: observability and observability matching condition. However, in contrast with the Pyragas conjecture, only the linear output of the transmitter is required to ensure the synchronization and a correct deciphering. So, this chapter underlines the efficiency of the observer design approach in the unidirectional synchronization. Nevertheless, as it was pointed out in section 9.1, the case of bidirectional synchronization is more difficult to analyze. We think that this case must be analyzed thanks to some energy concepts (passivity), some invariant concepts (LaSalle), and analysis of all types of bifurcations (stability, controllability, and observability) must be taken into account in this case.
Acknowledgements The authors would like to thank M. Djemai, R. Tauleigne, and D. Boutat for their help and fruitful discussions.
0882-Perruquetti-ch09_R2_30805
404
9.8
Observability Bifurcations
Appendix
9.8.1
Proof of Proposition 1
Consider system (9.14) and let x = z − [2] (z) then: x˙ = Az + Bu + f [2] (z) + g[1] (z)u + O3 (z, u) ∂[2] (Az + Bu + f [2] (z) + g[1] (z)u + O3 (z, u)) ∂z
−
and comparing its quadratic part with the following system: x˙ = A(z − [2] (z)) + Bu + f¯ [2] (z − [2] (z)) + g¯ [1] (z − [2] (z))u + β [2] (z1 ) + γ [1] (z1 )u + O3 (z − [2] (z), u) we obtain: Az − A[2] (z) + f¯ [2] (z) + g¯ [1] (z)u + β [2] (z1 ) + γ [1] (z1 )u Az + f [2] (z) + g[1] (z)u −
∂[2] (Az + Bu) ∂z
which gives the homological equations stated in Proposition 1: 1. A[2] (z) − 2. −
9.8.2
∂[2] Az = f¯ [2] (z) − f [2] (z) ∂z
∂[2] B = g¯ [1] (z) − g[1] (z) ∂z
modulo β [2] ( y)
modulo γ [1] ( y)
Proof of Theorem 2
Setting f¯ [2] (z) = 0, g¯ [1] (z) = 0, β [2] (z1 ), and γ [1] (z1 ) in homological equations of Proposition 1 we have: 1. Aobs [2] (z) − 2. −
∂[2] Aobs z = −f [2] (z) + β [2] (z1 ) ∂z
∂[2] B = −g[1] (z) + γ [1] (z1 ) ∂z
0882-Perruquetti-ch09_R2_30805
9.8
Appendix
405
Thanks to the condition [2] 1 (z) = 0 (i.e., y = z1 = x1 ) and to the structure of Aobs , the first homological equation gives: [2] [2] [2] 2 (z) = −f1 (z) + β1 (z1 )
[2] 3 (z)
=
n−1 ∂[2] i=1
[2] 4 (z) =
n−1 i=1
[2] n (z)
∂[2] ∂[2] 3 3 (ai z1 + zi+1 ) + an z1 − f3[2] (z) + β3[2] (z1 ) ∂zi ∂zn
.. .
.. .
.. .
∂[2] 2 (ai z1 + zi+1 ) + an z1 − f2[2] (z) + β2[2] (z1 ) ∂zi ∂zn 2
=
n−1 ∂[2] n−1 i=1
∂zi
(ai z1 + zi+1 ) +
∂[2] n−1 ∂zn
[2] [2] an z1 − fn−1 (z) + βn−1 (z1 )
and for the last row we obtain: 0=
n−1 ∂[2] n i=1
∂zi
(ai z1 + zi+1 ) +
∂[2] n an z1 − fn[2] (z) + βn[2] (z1 ) ∂zn
The (n − 1) first equations give the value of [2] (z), which cancels all quadratic terms in the (n − 1) first lines of f [2] (z). Moreover, as β [2] (z1 ) is a free homogeneous vector field, it is also possible to cancel some terms of fn[2] (z). More precisely, setting βi[2] (z1 ) = β1,i z12 , for the first equation we have: [2] 2 [2] 2 (z) = −f1 (z) + β1,1 z1
and for the second equation we obtain: [2] 3 (z) =
n−1 ∂ −f [2] (z) + β1,1 z2 1 1 i=1
−
∂zi
(ai z1 + zi+1 )
∂f1[2] (z) an z1 − f2[2] (z) + β1,2 z12 ∂zn
thus, we rewrite [2] 3 (z) as follows: 2 ¯ [2] z, β1,1 z12 [2] 3 (z) = 2β1,1 z1 z2 + β1,2 z1 + 3
0882-Perruquetti-ch09_R2_30805
406
Observability Bifurcations
where n−1 ∂f1[2] (z) ¯ [2] z, β1,1 z12 = 2β1,1 a1 z12 − f [2] (z) − (ai z1 + zi+1 ) 3 2 ∂zi i=1
−
∂f1[2] (z) ∂zn
an z1
Consequently, the third equation becomes:
[2] 4 (z) =
n−1 ∂ 2β1,1 z1 z2 + β1,2 z2 + ¯ [2] z, β1,1 z2 3 1 1 ∂zi
i=1
(ai z1 + zi+1 )
¯ [2] z, β1,1 z2 ∂ 1 3 + an z1 − f3[2] (z) + β1,3 z12 ∂zn And we can rewrite [2] 4 (z) as follows: [2] 2 2 2 ¯ [2] z, β (z) = 2β z z + 2β z z + β z + z , β z z , β z 1,1 1 3 1,2 1 2 1,3 1,1 1,1 1 2 1,2 1 1 1 4 4 where only terms of the form β1,i z1 zj , for j + i ≥ 4 are considered outside ¯ [2] , thus we have: the function 4 ¯ [2] (z, β1,1 z12 , β1,1 z1 z2 , β1,2 z12 ) 4 = 2 β1,2 a1 + β1,1 a2 z12 + 2β1,1 z22 + 2β1,1 a1 z1 z2 n−1 ¯ [2] ¯ [2] z, β1,1 z2 ∂ ∂ 3 z, β1,1 z12 3 1 + (ai z1 + zi+1 ) + an z1 − f3[2] (z) ∂zi ∂zn i=1
Recursively, we obtain:
[2] n (z) = 2z1
n−1
β1,n−i zi + β1,n−1 z12
i=2
z, β1,1 ¯ [2] + n
n−2 j≥i=1
zi zj , β1,2
n−3 j≥i=1
zi zj , ., β1,n−1 z12
0882-Perruquetti-ch09_R2_30805
References
407
And finally the last equation gives:
0=
n−1
(ai z1 + zi+i )
2 ¯ [2] ∂ 2z1 n−1 j=2 β1,n−j zj + β1,n−1 z1 + n (. . .) ∂zi
i=1
+
¯ [2] ∂ n (. . .) an z1 − fn[2] + β1,n z12 ∂zn
which gives: −2z1
n−1
β1,n−i zi −β1,n z12 =
i=2
n−1 ¯ [2] ∂ n (. . .)
∂zi
i=1
+2
n−1
(ai z1 +zi+1 )+
¯ [2] ∂ n (. . .) an z1 −fn[2] ∂zn
β1,n−i zi (a1 z1 +z2 )+2β1,n−1 z1 (a1 z1 +z2 )
i=1
Consequently, the free vector field β [2] (z1 ) can only cancel the quadratic term z1 zi for all i ∈ {1, . . . , n} in the last equation. For the second homological equation, we have only γ [1] (z1 ) as a free vector field. Thus in γ [1] (z1 ) = −
∂[2] B + g[1] (z) ∂z
the vector field γ [1] (z1 ) is only able to cancel terms in z1 .
References 1. J.-P. Barbot, I. Belmouhoub, and L. Boutat-Baddas, Observability normal forms, LNCIS 295, in New Trends in Nonlinear Dynamics and Control, W. Kang et al., Eds., Springer-Verlag, Berlin, Heidenberg, 2003, pp. 3–17. 2. J.-P. Barbot, T. Boukhobza, and M. Djemai, Sliding mode observer for triangular input form, in Proceedings of the 35th CDC, Kobe, Japan, 1996. 3. J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Quadratic forms and approximate feedback linearization in discrete time, Int. Jour. Control, 67 (4), 567–586, 1997. 4. G. Bartolini, A. Pisano, and E. Usai, First and second derivative estimation by sliding mode technique, Int. J. Signal processing, 4, 167–176, 2000. 5. I. Belmouhoub, M. Djemai, and J.-P. Barbot, Cryptography by discrete-time hyperchaotic systems, in Proccedings of the 43th IEEE CDC 03, Maui, Hawai, 2003.
0882-Perruquetti-ch09_R2_30805
408
Observability Bifurcations
6. I. Belmouhoub, M. Djemai, and J.-P. Barbot, Observability quadratic normal forms for discrete-time systems, IEEE-TAC, 50 (7), 1031–1038, 2005. 7. G. Besançon, A viewpoint on observability and observer design for nonlinear system, Lecture Notes in Control and Information Sciences, 244, Springer, 1999, pp. 1–22. 8. D. Bestle and M. Zeitz, Canonical form observer design for nonlinear time varying systems, Int. J. Control, 38, 429–431, 1983. 9. J. Birk and M. Zietz, Extended Luenberger observers for nonlinear multivariable systems, Int. J. Control, 47, 1823–1836, 1988. 10. L. Boutat-Baddas, D. Boutat, J.-P. Barbot, and R. Tauleigne, Quadratic Observability normal form, in Proceedings of the 41st IEEE CDC 01, Orlando, 2001. 11. L. Boutat-Baddas, J.-P. Barbot, D. Boutat, and R. Tauleigne, Observability bifurcation versus observing bifurcations, in Proceedings of the IFAC World Congress, Barcelona, 2002. 12. D. Boutat and J.-P. Barbot, Poincaré normal form for a class of drifless systems in a one-dimensional submanifold neighborhood, Math. Control, Signals Systems, 15, 256–274, 2002. 13. G. Chen and X. Dong, From chaos to order: methodologies, perspectives and applications, World Scientific Series on Nonlinear Science, Series A, vol. 24, World Scientific, 1998. 14. S. Diop, J.W. Grizzle, P.E. Morral, and A.G. Stefanoupoulou, Interpolation and numerical differentiation for observer design, in Proceedings of the American Control Conference, American Automatic Control Council, Evanston, IL, 1994, pp. 1329–1335. 15. S. Drakunov and V. Utkin, Sliding mode observer: Tutorial, in Proceedings of the IEEE CDC, New Orleans, 1995. 16. J.-P. Gauthier and G. Bornard, Observability for any u(t) of a class of bilinear systems, IEEE Trans. Autom. Control, 26, 922–926, 1981. 17. J.-P. Gauthier, H. Hammouri, and S. Othman, A simple observer for nonlinear systems: application to bioreactors, IEEE Trans. Autom. Control, 37, 875–880, 1992. 18. G. Gu, A. Sparks, and W. Kang, Bifurcation analysis and control for model via the projection method, in Proceedings of the ACC, IEEE, Philadelphia, 3617–3621, 1998. 19. B. Hamzi, J.-P. Barbot, S. Monaco, and D. Normand-Cyrot, Nonlinear discretetime control of systems with a Naimar-Sacker bifurcation, Syst. Control Lett., 44, 245–258, 2001. 20. B. Hamzi, W. Kang, and J.-P. Barbot, On the control of bifurcations, in Proceedings of the 39th IEEE CDC, Phoenix, 1999. 21. J. Hauser and Z. Xu, An approximate Frobenius theorem, in Proceedings of the IFAC World Congress, IFAC, Sydney, vol. 8, pp. 43–46, 1993. 22. R. Hermann and A.J. Krener, Nonlinear controllability and observability, IEEE Trans. Autom. Control, 22, 728–740, 1977. 23. M. Hou and P.C. Muller, Design of observers for linear systems with unknown inputs, IEEE Trans. Autom. Control, 37, 871–875, 1992. 24. M. Hou, K. Busawon, and M. Saif, Observer design based on triangular form generated by injective map, IEEE Trans. Autom. Control, 45, 1350–1355, 2000. 25. A. Isidori, Non-linear Control Systems, 2nd ed., Springer-Verlag, New York, 1989.
0882-Perruquetti-ch09_R2_30805
References
409
26. M. Itoh and L.O. Chua, Reconstruction and synchronization of hyperchaotic circuit via one state variable, Int. J. Bif. Chaos, 12 (10), 2069–2085, 2002. 27. W. Kang, Bifurcation and normal form of nonlinear control system: Part I and II, SIAM J. Control Optim., 36, 193–232, 1998. 28. W. Kang and A.J. Krener, Extended quadratic controller normal form and dynamic state feedback linearization of non linear systems, SIAM J. Control Optim., 30 (6), 1319–1337, 1992. 29. W. Kang and A.J. Krener, Nonlinear observer design, a backstepping approach, personal communication. 30. H. Keller, Nonlinear observer design by transformation into a generalized observer canonical form, Int. J. Control, 46, 1915–1930, 1987. 31. H.K. Khalil, Nonlinear System, Macmillan, New York, 2nd ed., 1995. 32. H.K. Khalil, High-gain observers in nonlinear feedback control, Lecture Notes in Control and Information Sciences, vol. 244, Springer, 1999, pp. 249–268. 33. H.J. Korsch and H.-J. Jodl, Chaos. A Program Collection for the PC, Springer, 2nd ed., 1998. 34. A.J. Krener, Approximate linearization by state feedback and coordinate change, Syst. Control Lett., 5 , 181–185, 1983. 35. A.J. Krener, Feedback linearization mathematical control theory, in Mathematics Control and Theory, J. Bailleul and J.-C. Willems (eds), Springer, 1998, pp. 66–98. 36. A.J. Krener and L. Li, Normal forms and bifurcations of discrete time nonlinear control systems, SIAM J. Control Optim., 40, 1697–1723, 2002. 37. A. Krener and A. Isidori, Linearization by output injection and nonlinear observer, Syst. Control Lett., 3, 47–52, 1983. 38. A.J. Krener and W. Respondek, Nonlinear observer with linearizable error dynamics, SIAM J. Control and Optim., 23, 197–216, 1985. 39. A.J. Krener and M.Q. Xiao, Observers for linearly unobservable nonlinear systems, Syst. Control Lett., 46, 281–288, 2002. 40. J.P. LaSalle, Some extentions of Lyapunov’s second method, IRE Trans. Circ. Theory, CT-7, 520–527, 1960. 41. C. Lobry, Contôlabilité des systèmes non linéaires, SIAM J. Control., 573–605, 1970. 42. E.E. Macau, C. Grebogi, and Y.-C. Lay, Active synchronization in nonhyperbolic hyperchaotic systems, Phys. Rev. E, 65, 027202, 2002. 43. H. Nijmeijer and I.M.Y. Mareels, An observer looks at synchronization, IEEE Trans. Circuits Syst. 1. Fundame. Theory Appl., 44 (11), 882–891, 1997. 44. H. Nijmeijer and van der Schaft, Nonlinear Dynamical Control Systems, SpringerVerlag, Berlin, 1990. 45. W. Perruquetti and J.-P. Barbot, Sliding Mode Control in Engineering, Marcel Dekker, 2002. 46. F. Plestan and A. Glumineau, Linearization by generalized input-output injection, Syst. Control Lett., 31, 115–128, 1997. 47. H. Poincaré, Les Méthodes Nouvelles de la Mécanique Céleste, Gauthier Villard, 1899 Réedition 1987, Bibliothèque Scientifique A. Blanchard. 48. J.H. Peng, E.J. Ding, M. Ding, and W. Yang, Synchronization hyperchaos with a scalar transmitted signal, Phys. Rev., 76 (6), 904–907, 1996. 49. K. Pyragas, Predictable chaos in slightly perturbed unpredictable chaotic systems, Phys. R. Lett. A, 181, 203–210, 1993.
0882-Perruquetti-ch09_R2_30805
410
Observability Bifurcations
50. A. Robertsson and R. Johansson, Observer backstepping for a class of nonminimum-phase systems, in Proceedings of the 38th IEEE-CDC, Phoenix, 1999. 51. O.E. Rossler, An equation for hyperchaos, Phys. Lett., 71A (2,3), 1979. 52. J. Rudolph and M. Zeitz, A Block triangular nonlinear observer normal form, Syst. Control Lett., 23, 1–8, 1994. 53. H.J. Sussmann, Single input observability of continuous time systems, Math. Syst. Theory, 12, 371–393, 1979. 54. J.-J. Slotine, J.K. Hedrick, and E.A. Misawa, On sliding observer for nonlinear systems, ASME JDSMC, 109, 245–252, 1987. 55. I.A. Tall and W. Respondek, Normal forms and invariants of nonlinear singleinput systems with noncontrollable linearization, in Proceedings of the IFAC NOLCOS, Barcelona, 2001. 56. R. Tauleigne, L. Boutat-Baddas, and J.-P. Barbot, Syntonisation Chaotique, in Proceedings Journée d”Etude Automatique et Electronique, Angoulême, France, 12 2002. 57. J. Tsinias, Observer design for nonlinear systems, Syst. Control Lett., 13, 135–142, 1989. 58. M. Vidyasagar, Nonlinear Systems Analysis, 2nd ed., Classics in Applied Mathematics, vol. 42, SIAM, 2002. 59. S. Wigging, Introduction to Applied Nonlinear Dynamical Systems and Chaos, Text in Applied Mathematics, vol. 2, Springer-Verlag, New York, 1998. 60. X. Xia and W. Gao, Nonlinear observer design by observer error linearization, SIAM J. Control Optim., 27, 199–213, 1989. 61. Y. Xiong and M. Saif, Sliding mode observer for nonlinear uncertain systems, IEEE Trans. Autom. Control, 46, 2012–2017, 2001.
0882-Perruquetti-ch10_R2_290705
10 Nonlinear Observer Design for Smooth Systems
A.J. Krener and M. Xiao
CONTENTS 10.1 Introduction 10.2 Main Results 10.3 Conclusion . References . . . . .
10.1
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
411 415 421 421
Introduction
Recently, Kazantzis–Kravaris and Kreisselmeier–Engel have suggested two apparently different approaches for constructing observers for nonlinear systems. We show that these approaches are closely related, leading to observers with linear error dynamics in transformed variables. In particular, we give the sufficient conditions for the existence of smooth solutions to the Kazantzis–Kravaris partial differential equation (KK PDE). These methods can be used for systems that exhibit chaotic behavior. We consider the problem of constructing an observer for a smooth system without controls x˙ = f (x) = Fx + f¯ (x) ¯ y = h(x) = Hx + h(x)
(10.1)
x(0) = x0 where f : X → Rn and h : X → Rp are Cr functions with r ≥ 1 and f¯ (x) = ¯ o(x), h(x) = o(x). The set X ⊂ Rn is assumed to be an invariant subset of 411
0882-Perruquetti-ch10_R2_290705
412
Nonlinear Observer Design for Smooth Systems
the dynamics and a neighborhood of the equilibrium x = 0. We let Y = h(X ) ⊂ Rp . Typically p ≤ n. An observer is a second dynamical system z˙ˆ = a(ˆz, y) = Aˆz + By + a¯ (ˆz, y) xˆ = c(ˆz, y) = Cˆz + Dy + c¯ (ˆz, y)
(10.2)
zˆ (0) = zˆ 0 where a : Z × Y → Rk and c : Z × Y → Rn are Cr functions, Z ⊂ Rk and a¯ (ˆz, y) = o(ˆz, y), c¯ (ˆz, y) = o(ˆz, y). The goal is to choose the observer in such a way that the estimation error x˜ (t) = x(t) − xˆ (t) → 0 as t → ∞. The dimension k of the observer can be different from the dimension n of the system. For nonlinear systems one expects that k ≥ n. There is a vast literature on this topic; we refer the reader to a recent survey paper [3] and conference proceedings [6]. Kazantzis and Kravaris [1] have introduced a method for constructing an observer which has linear error dynamics in transformed coordinates. We briefly review their method. Suppose the system (10.1) is real analytic, one selects an n × p matrix B and an invertible n × n matrix T such that the matrix A = (TF − BH)T −1 is Hurwitz and such that the eigenvalues of A are distinct from those of F. Then one seeks a real analytic solution of the KK PDE ∂θ (x)f (x) = Aθ (x) + β(h(x)) ∂x
(10.3)
where β : Y → Rn is real analytic and ∂β ( y) = B ∂y If θ satisfies this PDE then ∂θ (0) = T ∂x and so θ is a local diffeomorphism. If we define a change of coordinates z = θ (x) then z˙ = Az + β( y) y = h(θ −1 (z))
(10.4)
0882-Perruquetti-ch10_R2_290705
10.1
Introduction
413
One can construct a local observer for the transformed system (10.4), z˙ˆ = Aˆz + β( y) xˆ = θ −1 (ˆz)
(10.5)
zˆ (0) = 0 which has linear error dynamics in the transformed coordinates z˙˜ = A˜z
(10.6)
where z˜ (t) = z(t) − zˆ (t). Since A is Hurwitz, the error goes to zero as t → ∞, provided x(t) stays sufficiently small. The observer can also be implemented in the original coordinates, x˙ˆ = f (ˆx) +
−1
∂θ (ˆx) ∂x
β( y) − β(h(ˆx))
(10.7)
This is a standard form for an observer, a copy of this dynamics driven by a gain times the estimation error of some function of y. In this case, the gain varies with xˆ . Kazantzis and Kravaris [1] presented sufficient conditions for the solvability of (10.3). We need some definitions to state them. Let λ = (λ1 , . . . , λn ) denote the spectrum of F. We say that a complex number µj is resonant of degree d > 0 with the spectrum of F if there is a tuple m = (m1 , . . . , mn ) of non-negative integers n i=1
mi λi = µj ,
n
mi = d
i=1
The spectrum of F is in the Siegel domain if 0 is in the convex hull of λ1 , . . . , λn in C. The spectrum of F is in the Poincaré domain if 0 is not in the convex hull of λ1 , . . . , λn . Since F is real, the spectrum of F is in the Poincaré domain iff it is in the open left half plane of C or it is in the open right half plane of C. Let µ = (µ1 , . . . , µn ) denote the spectrum of A. Kazantzis and Kravaris [1] showed that if no µj is resonant of any degree d with the spectrum of F and if the spectrum of F is in the Poincaré domain, then for a given real analytic β( y) the KK PDE has a unique real analytic solution defined in some neighborhood of x = 0. Suppose C > 0, ν > 0. A complex number µj is type (C, ν) with respect to the spectrum of F if for any tuple m = (m1 , . . . , mn ) of non-negative integers
0882-Perruquetti-ch10_R2_290705
414 with
Nonlinear Observer Design for Smooth Systems
mi = d > 0, one has n C mi λi − µ j ≥ ν d i=1
Recently, we claimed that if the spectrum of A is of type (C, ν) with respect to the spectrum of F, then for given real analytic β( y) the KK PDE has a unique real analytic solution defined in some neighborhood of x = 0 but we have found an error in our proof [4]. One needs the additional assumption that the spectrum of F is of type (C, ν) with respect to the spectrum of F [4]. Another approach to observer design has recently been presented by Kreisselmeier and Engel [2]. The purpose of our paper is to show that their approach is closely related to that of Kazantzis and Kravaris and the two approaches taken together yield the existence of smooth solutions to the KK PDE under suitable conditions. Given the system (10.1), Kreisselmeier and Engel construct an observer as follows. Choose a k × k Hurwitz matrix A and a k × p matrix B where k ≥ n. Given x0 , let x(s, x0 ), y(s, x0 ) denote the corresponding state and output trajectories of (10.1). Define z0 = θ (x0 ) =
0 −∞
e−As By(s, x0 ) ds,
(10.8)
one has to impose suitable conditions so that the integral exists. If one can find a mapping x0 = ψ(z0 ) which is a left inverse of θ, ψ(θ(x0 )) = x0 then one can construct the Kreisselmeier and Engel observer z˙ˆ = Aˆz + By xˆ = ψ(ˆz)
(10.9)
Kreisselmeier and Engel showed that for a suitable choice of A, B, the mapping θ is injective so that ψ exists. We shall show that the error in the transformed variables z˜ (t) = z(t) − zˆ (t) has linear error dynamics (10.6). Let us review the differences in the approaches of Kazantzis–Kravaris and Kreisselmeier–Engel. The Kazantzis–Kravaris construction applies to real analytic systems and defines an observer of the same dimension as the system. The observer is constructed by a real analytic change of coordinates found by solving the KK PDE. The KK PDE is locally solvable if the spectrum of the linear part of the dynamics is in the Poincaré domain and if the spectrum of the linear part of the observer is not resonant with
0882-Perruquetti-ch10_R2_290705
10.2
Main Results
415
that of the dynamics. Our recent work [4], establishes that it is also locally solvable if the spectrum of both F and A are of type (C, ν) with respect to the spectrum of F. This local solution leads to a local observer. Conditions for the global solvability of the KK PDE are not known. The Taylor series of the solution of the KK PDE can be found to any degree by solving a sequence of linear equations for the coefficients and therefore, the Taylor series of the inverse can be found up to the same degree. This is essential if the observer is to be implemented in the transformed coordinates. The inverse change of coordinates need not be found if the observer is implemented in the original coordinates, but the Jacobian of the change of coordinates must be inverted. If the system (10.1) is only Cr and if the spectrum of A is not resonant up to degree d ≤ r with the spectrum of F, an approximate solution to the KK PDE, polynomial of degree d, can be found and used to construct a local observer with error dynamics linear to degree d in the transformed coordinates. The Kreisselmeier–Engel construction applies to Lipschitz continuous systems (10.1) and defines an observer whose dimension is at least as large as that of the system. The observer is constructed by a change of variables found through an integral equation but the change of variables need not be a change of coordinates. It is not guaranteed to be smooth even if the system is. It can be hard to compute explicitly. Its existence depends on growth conditions for the output of the system in negative time. A left inverse of the change of variables must be found. The observer is implemented in the transformed variables where it has linear error dynamics. The Kreisselmeier–Engel observer requires a choice of A and B to define θ by (10.8). When the system (10.1) is C1 then the convergence of this integral implies that the spectra of A and F are disjoint. We shall show that if (10.3) does not hold for some invertible T then θ is not differentiable.
10.2
Main Results
In this section, we make the following assumptions about the system x˙ = f (x) y = h(x) x(0) = x
(10.10)
0
1. f : X → Rn and h : X → Rp are Lipschitz continuous on an invariant set X ∈ Rn with Lipschitz constants Lf and Lh , respectively
0882-Perruquetti-ch10_R2_290705
416
Nonlinear Observer Design for Smooth Systems
2. A is k × mk Hurwitz matrix and there are M > 0, a > Lf such that |eAt | ≤ Me−at 3. β : Y → Rk and Lipschitz continuous with Lipschitz constant Lβ 4. When the integral exists, θ is defined by 0
0
z = θ (x ) =
0
−∞
e−As β(y(s, x0 )) ds
(10.11)
THEOREM 1
Under Assumptions 1–4, the map θ : X → Rn exists and is Lipschitz continuous. Given x0 , let x(s, x0 ), y(s, x0 ) denote the corresponding state and output trajectories of (10.1). Now
PROOF
x(t, x0 ) = x0 +
t
f (x(s, x0 )) ds
0
|x(t, x0 )| ≤ |x0 | + |x(t, x0 )| ≤ |x0 | +
t 0 t 0
| f (x(s, x0 ))| ds Lf |x(s, x0 )| ds
so by Gronwall’s inequality |x(t, x0 )| ≤ |x0 |eLf |t| Hence, |y(t, x0 )| ≤ Lh |x0 |eLf |t| |β(y(t, x0 ))| ≤ Lβ Lh |x0 |eLf |t| Since, a − Lf > 0, the integral exists 0 θ (x ) ≤
0 −∞
≤ ≤
0
−∞
−As β(y(s, x0 )) ds e MLβ Lh |x0 |e(a−Lf )t ds
MLβ Lh |x0 | a − Lf
0882-Perruquetti-ch10_R2_290705
10.2
Main Results
417
Next we show that θ is Lipschitz continuous. Given two initial conditions x0 , x1 ∈ X , with corresponding state and output trajectories x(t, xi ), y(t, xi ), the Lipschitz assumptions imply that x(t, x1 ) − x(t, x0 ) ≤ x1 − x0 eLf |t| y(t, x1 ) − y(t, x0 ) ≤ Lh x1 − x0 eLf |t| β(y(t, x1 )) − β(y(t, x0 )) ≤ Lβ Lh x1 − x0 eLf |t| so 1
0
0
|θ (x ) − θ (x )| ≤
−∞
≤
0
−∞
−As β(y(t, x1 )) − β(y(t, x0 )) ds e −As |Lβ Lh |x1 − x0 eLf |s| ds e
≤ x1 − x0
0 −∞
MLβ Lh e(a−Lf )s ds
The map θ is Lipschitz continuous with Lipschitz constant Lθ =
0 −∞
MLβ Lh e(a−Lf )s ds =
MLβ Lh a − Lf
THEOREM 2
Under Assumptions 1–4, let x(t), y(t) be state and output trajectories of the system where x(0) ∈ X . Let z(t) = θ (x(t)) where θ is defined by (10.8). Then d z(t) = Az(t) + β(y(t)) dt PROOF
Because the system is autonomous z(t) =
0 −∞
e−As β(y(s + t)) ds
Let r = s + t then z(t) = e At
t −∞
e−AR β(y(r)) dr
so z˙ (t) = Az(t) + β(y(t))
0882-Perruquetti-ch10_R2_290705
418
Nonlinear Observer Design for Smooth Systems
REMARK 1
It is interesting to note that Theorem 2 does not require any assumption of differentiability. COROLLARY 1
The Kreisselmeier–Engel observer (10.9) has linear error dynamics in transformed variables. COROLLARY 2
Under Assumptions 1–4, if θ (x) is C1 then θ (x) satisfies the KK PDE (10.3). COROLLARY 3
Under Assumptions 1–4, the observer (10.5) has asymptotically stable, linear error dynamics in the z variables. THEOREM 3
In addition to Assumptions 1-4, assume that f , h, and β are C1 . Then θ is C1 . PROOF
Proceeding formally from (10.8) we have ∂θ 0 (x ) = ∂x0
0
−∞
e−As
∂β ( y(s, x0 )) ds ∂x0
If this integral converges then it is the actual derivative. By the chain rule ∂θ 0 (x ) = ∂x0
0
−∞
e−As
∂β ∂h ∂x (y(s, x0 )) (x(s, x0 )) 0 (s, x0 ) ds ∂y ∂x ∂x
Let ∂x (s, x0 ) ∂x0 ∂f F(s, x0 ) = (x(s, x0 )) ∂x ∂h (x(s, x0 )) H(s, x0 ) = ∂x ∂β (y(s, x0 )) B(s, x0 ) = ∂y (s, x0 ) =
Now d (s, x0 ) = F(s, x0 )(s, x0 ) ds (0, x0 ) = I
0882-Perruquetti-ch10_R2_290705
10.2
Main Results
419
so
t
0
(t, x ) = I +
F(s, x0 )(s, x0 ) ds
0
t 0 (t, x ) ≤ |I| + F(s, x0 ) (s, x0 ) ds 0
t 0 Lf (s, x0 ) ds (t, x ) ≤ 1 + 0
and by Gronwall’s inequality (t, x0 ) ≤ eLf |t| Finally
0 −∞
−As 0 0 0 B(s, x )H(s, x )(s, x ) ds ≤ e
0 −∞
MLβ Lh e(a−Lf )s ds
≤ Lθ so (∂θ /∂x)(x0 ) exists for x0 ∈ X . Suppose f , h are C1 on X with Lipschitz continuous derivatives ∂f /∂x, ∂h/∂x and β is C1 on Y with Lipschitz continuous derivative ∂β/∂y. One can show that if a is large enough then ∂θ/∂x is Lipschitz continuous. Furthermore, if f , h, β are C2 then ∂ 2 θ /∂x2 exists. Similar statements hold for the higher derivatives. For C∞ functions f , h, β and compact X , the larger a the more derivatives of θ that can be shown to exist. THEOREM 4
In addition to Assumptions 1–4, assume that f , h, and β are C1 and ∂f (0) = F ∂x ∂h (0) = H ∂x ∂β (0) = B ∂y Then ∂θ (0) = T ∂x
0882-Perruquetti-ch10_R2_290705
420
Nonlinear Observer Design for Smooth Systems
where T is the unique solution of TF − AT = BH
(10.12)
If λ is an eigenvalue of F then |λ| ≤ Lf and if µ is an eigenvalue of A then |µ| ≥ a. Since a > Lf , the spectra of F and A are disjoint. Therefore, (10.12) has a unique solution T. From the definition of θ, we have
PROOF
∂θ (0) = ∂x Let
S=
0 −∞
0
−∞
e−As BHeFs ds
e−As BHeFs ds
then
0
−∞
d −As e BHeFs ds = BH ds SF − AS = BH
(10.13)
Therefore, T and S satisfy Equation (10.12) and Equation (10.13) so T = S. COROLLARY 4
In addition to Assumptions 1–4, assume that f , h, and β are C1 . If F, H, A, B are not related by (10.12) for some T then θ (10.11) is not differentiable at x = 0. COROLLARY 5
In addition to Assumptions 1–4, assume that k = n and f , h, and β are C1 then θ is a local diffeomorphism iff the unique T satisfying (10.12) is invertible. THEOREM 5
Suppose the spectra of F and A are disjoint and T satisfies (10.12). If (H, F) is not observable then T is not invertible. Suppose (H, F) is not observable then there exist λ ∈ σ (F) and a vector x ∈ Rn , x = 0 such that Hx = 0 and Fx = λx. We multiply (10.12) by x to obtain
PROOF
λTX − Tax = 0 If T is invertible the Tx = 0 so λ is an eigenvalue of A which is a contradiction.
0882-Perruquetti-ch10_R2_290705
References
421
THEOREM 6
Suppose the spectra of F and A are disjoint and T satisfies (10.12). If (A, B) is not controllable then T is not invertible.
Suppose (A, B) is not controllable then there exist µ ∈ σ (A) and a vector ξ ∈ Rn , ξ = 0 such that ξ B = 0 and ξ A = µξ . We multiply (10.12) by ξ to obtain
PROOF
ξ TF − µξ T = 0. If T is invertible the ξ T = 0 so µ is an eigenvalue of F which is a contradiction.
10.3
Conclusion
We have shown that the approaches of Kazantzis–Kravaris and Kreisselmeier–Engel to observer design are closely related. Both lead to observers with linear error dynamics in transformed variables. The former requires the solution of a PDE and the latter requires multiple solutions to an ODE followed by quadratures. From an implementation point of view, the former is easier as the PDE can be solved approximately by a finite power series; but this solution is only local as is the resulting observer. Neither approach has been generalized to systems with inputs yet. These methods can be used to construct observers for systems that can exhibit chaotic behavior as was shown earlier [5].
References 1. N. Kazantzis and C. Kravaris, Nonlinear observer design using Lyapunov’s auxiliary theorem, Syst. Control Lett., 34, 241–247, 1998. 2. G. Kreisselmeier and R. Engel, Nonlinear observers for autonomous Lipshitz continues systems, IEEE Trans. Autom. Contr., 48 (3), 451–464, 2003. 3. A.J. Krener, Nonlinear observers, in control of nonlinear systems, in Encyclopedia of Life Support Systems, H. Unbehausen, Ed., Eolss Publishers, Oxford, UK, 2004 [http://www.eolss.net].
0882-Perruquetti-ch10_R2_290705
422
Nonlinear Observer Design for Smooth Systems
4. A.J. Krener and M. Xiao, Nonlinear observer design in the Siegel domain, SIAM J. Control Optim., 41 (3), 932–953, 2002. 5. A. Krener and M.Q. Xiao, Observer for linearly unobservable nonlinear systems, Syst. Control Lett., 46, 281–288, 2002. 6. H. Nijmeijer and T. Fossen, New Directions in Nonlinear Observer Design, Springer-Verlag, New York, 1999.
0882-Perruquetti-ch11_R2_170805
Part III
Some Applications
0882-Perruquetti-ch11_R2_170805
0882-Perruquetti-ch11_R2_170805
11 Chaos and Communications
R. Quéré, J. Guittard, and J.C. Nallatamby
CONTENTS 11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Synchronization of Chaotic Systems . . . . . . . . . . . . . . . . 11.2.1 Peccora–Caroll (PC) Synchronization . . . . . . . . . . 11.2.1.1 Principle of PC Synchronization . . . . . . . 11.2.1.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . 11.2.2 Feedback-Type Synchronization . . . . . . . . . . . . . 11.2.3 Synchronization by the Inverse System Approach 11.3 Communications with Chaos . . . . . . . . . . . . . . . . . . . . . 11.3.1 Chaos Masking . . . . . . . . . . . . . . . . . . . . . . . . . . 11.3.2 Chaos Modulation . . . . . . . . . . . . . . . . . . . . . . . 11.3.3 Chaos Shift Keying . . . . . . . . . . . . . . . . . . . . . . . 11.3.3.1 Coherent CSK . . . . . . . . . . . . . . . . . . . . 11.3.3.2 Noncoherent CSK . . . . . . . . . . . . . . . . . . 11.4 Analysis of a Microwave Chaotic Oscillator . . . . . . . . . . 11.4.1 Analysis of the Voltage Controlled Oscillator . . . . 11.4.1.1 Equations of the VCO . . . . . . . . . . . . . . . 11.4.1.2 Characteristics of the VCO . . . . . . . . . . . 11.4.2 Equation of the Chaotic Oscillator . . . . . . . . . . . . 11.5 Chaotic Modulator and Demodulator . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.1
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
426 426 426 426 428 430 431 433 433 433 434 434 435 437 437 438 441 441 447 451
Introduction
Techniques for the detection of unstable regimes of microwave nonlinear circuits have been presented in the previous chapters. These techniques are capable of predicting the local and the global stabilities of these circuits, and in some cases are also capable of detecting the bifurcation routes leading 425
0882-Perruquetti-ch11_R2_170805
426
Chaos and Communications
to chaotic behaviors. However, beyond these techniques that are mainly used to avoid the initiation of chaotic oscillations in nonlinear circuits, there has been considerable interest in the design of chaotic circuits for communication purposes. This interest has been aroused by the demonstration of Peccora and Caroll [1] of the ability to synchronize two chaotic systems. Following this, researchers tried to exploit this synchronization property to transmit information, using chaotic waves. Various techniques have been proposed that require the generation of analog or digital chaotic signals, which still remains a problem especially in the microwave domain. In this chapter, we will present an overview of the different modulation schemes that allow the transmission of some information with chaotic carriers. The particular problems of designing chaotic generators in the microwave domain will be pointed out. Indeed, special techniques for simulating such complex behaviors have to be used. It will be shown by a simple example how the transient envelope can cope with the simulation of chaotic circuits in the microwave domain. Section 11.2 will be devoted to the presentation of the various synchronization techniques that can be used. In Section 11.3, chaotic modulations for information transmission are reviewed, and Section 11.4 presents an insight into the simulation technique, using a simple chaotic generator example. Finally, an example of transmission of binary data will be discussed in Section 11.5 using the previous chaotic generator.
11.2 11.2.1
Synchronization of Chaotic Systems Peccora–Caroll (PC) Synchronization
11.2.1.1 Principle of PC Synchronization This kind of synchronization is the first that has been reported for chaotic systems. It relies on the decomposition of the initial chaotic into two subsystems. The receiver system is a replica of one of the two subsystems. Specifically, consider a chaotic autonomous system described by the n-dimensional nonlinear equation: x˙¯ = f (¯x)
x¯ ∈ Rn
(11.1)
Splitting (11.1) into two subsystems x˙¯ = [¯xs , x¯ d ]T leads to x˙¯ s = g(¯xs , x¯ d )
x¯ s ∈ Rs
x˙¯ d = h(¯xs , x¯ d )
x¯ d ∈ Rd
(11.2)
0882-Perruquetti-ch11_R2_170805
11.2
Synchronization of Chaotic Systems
427
Then, the receiver is constituted of a replica of the second subsystem and the receiver state variable equation reads: x˙¯ r = h(¯xs , x¯ r )
x¯ d ∈ Rd
(11.3)
where x¯ r ∈ Rd is the state vector which has to be recovered by the slave system and x¯ s ∈ Rs is a common state vector for the master and slave systems. The architecture of the synchronization master–slave system is illustrated in Figure 11.1. The two systems will synchronize if the difference between the transmitted and received state vectors converges to zero as time goes to infinity: ¯x = x¯ r − x¯ d −→ 0 t→∞
Thus, the first time domain derivative of the difference ¯x has to satisfy the nonlinear differential equation: x˙¯ = x˙¯ r − x˙¯ d = h(¯xs , x¯ r ) − h(¯xs , xd )
(11.4)
Provided the two phase trajectories in the phase space are sufficiently close to each other, the difference ¯x satisfies the linearized equation: x˙¯ =
∂h(xs , xd ) · ¯x + o(¯x2 ) ∂xd
(11.5)
n(t ) + . xs
(⋅)dt
xs g( ) . xr
. xd
(⋅)dt
xd
(⋅)dt
xr
h( )
h( ) Receiver (Slave)
Emitter (Master)
FIGURE 11.1 Architecture of the master–slave synchronization of two chaotic systems.
0882-Perruquetti-ch11_R2_170805
428
Chaos and Communications
where [∂h(xs , xd )/∂xd ] ∈ Rd×d is a time variant matrix that will give the stability of the solution of (11.5). However, as the drive of the slave subsystem is a chaotic signal, the stability of the solution must be investigated using the Lyapounov exponent concept [1]. These exponents are calculated from the eigenvalues of a time domain matrix A(t) defined as
∂h(xs , xd ) ˙ A = · A(t) ∂xd
(11.6)
A(0) = I
where A is a matrix that is substituted to the vector ¯x and I is the identity matrix. Anumber of algorithms are available for calculating the Lyapounov exponents from the eigenvalues of A(t) [2]. The solution of (11.5) will be stable if all the Lyapounov exponents are negative. Moreover, the magnitude of these exponents gives an indication of the rate of convergence toward the stable solution ¯x = 0.
11.2.1.2
Example
To illustrate the aforementioned point, we will analyze in greater detail the historical example which is based on the Lorenz system. This threedimensional system is autonomous and reads:
x˙ 1 = σ · (x2 − x1 ) x˙ 2 = −x1 · x3 + r · x1 − x2
(11.7)
x˙ 3 = x1 · x2 − b · x3
where σ , r, and b are three parameters whose values will determine the type of regime that will take place for this set of equations. For example, the phase portrait of a chaotic regime for a particular set of parameters is given in Figure 11.2.
0882-Perruquetti-ch11_R2_170805
11.2
Synchronization of Chaotic Systems
429
x3 73.9
42.7
−29 −1
11.5 −39
−2 x2
35
x1
27
FIGURE 11.2 Phase portrait of the Lorenz system in the chaotic regime for σ = 16, b = 4, and r = 45.92.
The slave subsystem can be chosen as one of the three couples of state variables, the third one being chosen as the common variable driving the slave subsystem. Thus, the decomposition can take one of the three following possibilities: x¯ d = [x1 , x2 ]; xs = x3
Case 1
x¯ d = [x1 , x3 ]; xs = x2
Case 2
x¯ d = [x2 , x3 ]; xs = x1
Case 3
In Ref. [1] it is shown that only Case 2 and Case 3 can lead to the synchronization of the slave system. For Case 2, we show in Figure 11.3 the waveforms in two cases corresponding to (a) synchronization and (b) no synchronization. Moreover, in Figure 11.4, the rate of convergence can be determined by plotting the magnitude (in log scale) of the error signal ¯x versus time. From this plot it can be noticed that the rate of convergence is higher for the state variable x1 than for x3 . However, one major disadvantage of this synchronization technique is its sensitivity to a mismatch of parameters between the emitter and the receiver. For example, we have plotted, for the same system, the magnitude of the error vector for two values of the mismatch corresponding 1 and 5% variation of the receiver’s parameters. From Figure 11.5 it can be noticed that as the mismatch increases there is a sharp increase in the floor of the magnitude of the error signal. Moreover, in the case of wireless transmission of the drive signal, the received signal at the slave front-end is corrupted by noise.
0882-Perruquetti-ch11_R2_170805
430
Chaos and Communications
170
170
150
150
130
130
110
110
90
90
70
70
50
50
30
30
10
10 0
0.4
0.8
1.2
1.6
2.0
2.4
2.8
3.2
0
1
2
(a)
3
4
5
(b)
FIGURE 11.3 x1 waveforms corresponding to: (a) synchronization and (b) lack of synchronization.
11.2.2
Feedback-Type Synchronization
As seen from the previous example, PC synchronization suffers from a strong sensitivity to parameters mismatch as well as to noisy inputs. The main reason for this sensitivity is that this kind of synchronization is basically an open-loop synchronization [3]. Thus new techniques based on a Magnitude of the error signal 103 102 101 100
x3 − x´3
10–1 10–2 10–3 10–4 10–5
x1 − x´1
10–6 10–7 10–8 t (s)
10–9 10–10 0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
FIGURE 11.4 Plots of the error signal versus time for a perfect match of the emitter and receiver parameters.
0882-Perruquetti-ch11_R2_170805
11.2
Synchronization of Chaotic Systems
103
431
Magnitude of the error signal 5% 1% 5% 1%
x3 − x´3 102 x1 − x´1 101 100 10–1 10–2 10–3 10–4
t (s) 10–5 0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
FIGURE 11.5 Plots of the magnitude of the error signal in the case of a mismatch of master and slave parameters.
feedback loop have been developed to recover the input signals. These techniques use a replica of the original system and the transmitted signal xs (t) is compared to a locally regenerated signal x˜ s (t) to produce and error signal ε(t) which is fed back into the system trough a correction function c( ) as shown in Figure 11.6. Then, the equation of the receiver system reads: x˙¯ = f (x) + c (ε(t)) = f (x) + c xs (t) − x˜ s (t)
(11.8)
By a proper choice of the correction function, it can be shown [4] that under certain conditions the global stability of the steady state condition ε(t) = 0 can be maintained. Moreover, this approach has been recently used to synchronize two different pairs of chaotic oscillators [5].
11.2.3
Synchronization by the Inverse System Approach
The third type of synchronization system works for non-autonomous systems. A formal definition of such inverse systems is given in Ref. [6]. An example of such a system is given in Figure 11.7 [7]. The diode circuit is well known for producing chaotic signals under certain conditions of
0882-Perruquetti-ch11_R2_170805
432
Chaos and Communications noise
. x
x
(⋅) dt
g( )
+
+ x s (t ) + n(t ) +
ε
c( )
−
f( )
~ x s (t )
Emitter (Master)
+
. x
(⋅) dt
x
g( )
f( )
Receiver (Slave)
FIGURE 11.6 Architecture of a feedback-type chaotic synchronization.
frequency and amplitude of the input generator. The chaotic current is then tranformed into an output voltage through the operational amplifier shown in the figure. In contrast, the nonlinear diode resonant circuit of the receiver is fed by the current obtained from the emitter circuit. Thus, to ensure a null current at the input of the second operational amplifier, the output of the receiver r(t) must match the input signal e(t). When the input signal is a modulated one, the received signal will carry the same modulation information when synchronization holds.
R1 R
D
e(t )
L
R
R1
− +
+ −
L
D
− +
s(t )
r (t )
FIGURE 11.7 Example of a non-autonomous synchronization system based on an inverse system.
0882-Perruquetti-ch11_R2_170805
11.3
Communications with Chaos
11.3
Communications with Chaos
433
In Section 11.2, a brief review of chaos synchronization techniques has been given. From this idea of chaos synchronization capability, a number of chaos-based communications systems have been proposed with two goals in mind. The first one concerns spread spectrum systems where chaotic circuits can be an alternative to more expensive spreading circuits that work in the baseband domain. This can provide resistance against interferences in a multipath environment, but up to now, no chaotic synchronization systems have been used for CDMA transmissions. This is mainly due to the sensitivity of chaotic synchronizers to noise and to the absence of periodical reference in the chaotic spreading signal. A number of chaotic circuits have been used for CDMA systems. Samples of chaotic waves (generally digitally generated) are used instead of usual spreading and coding sequences [8, 9], or an overhead channel is required for transmitting synchronization signals [10]. The second one concerns secure communications and the use of chaotic signals for cryptographic purposes. Most of the works dealing with that subject are performed in the digital domain [11]. Three main methods for communicating with chaos can be distinguished.
11.3.1
Chaos Masking
In this technique, the information signal is simply added to the chaotic signal in order to mask it. If the level of the information signal is low when compared with the level of the chaotic signal, synchronization remains possible at the receiver front-end. However, in a noisy environmement as the masking is an additive process, the information signal cannot be separated from noise at the receiver output. Thus this technique is not very useful for transmission through noisy channels.
11.3.2
Chaos Modulation
In the chaos modulation method, the information signal is directly included in the dynamics of the chaotic generator. This is especially possible for synchronization by inverse systems. For example, for the system in Figure 11.7 the amplitude, frequency, or phase of the input generator can be modulated either in an analog or in a digital way. In this case, after a transient phase of synchronization, the receiver remains synchronized, thus allowing high
0882-Perruquetti-ch11_R2_170805
434
Chaos and Communications m(t )
s(t)
r (t)
m(t)
+
+ +
− T
Nonlinear function f (⋅)
T
T
T
T
T
Nonlinear function f (⋅)
FIGURE 11.8 Typical coder–decoder based on an inverse chaotic system.
bit rates. Other types of chaos modulation have been proposed either in the low-frequency range, using DSP implementations [12] or in the optical range [13]. A typical coder–decoder system of this type working in the lowfrequency range is given in Figure 11.8. A full example of chaos transmission using such a system will be given in Section 11.4.
11.3.3
Chaos Shift Keying
There are various types of chaos shift keying (CSK) that can be used. They can be classified into coherent and noncoherent techniques. All these techniques rely on the association of a digital information with a chaotic wave. 11.3.3.1 Coherent CSK In a coherent CSK system, the information symbol, say a binary digit, is associated with two chaotic signals s0 (t) and s1 (t) corresponding to the values “0” or “1” as shown in Figure 11.9. Signals s0 (t) and s1 (t) can be issued either from the same chaotic attractor with different initial conditions or from two different attractors produced by different circuits. The receiver is constituted of two slave circuits, which are replica of the emitter circuits and which have to be synchronized either on s0 (t) or on s1 (t). Decision of the transmitted bit is taken by comparing the outputs of the two correlators shown in Figure 11.9. The main disadvantage of this coding system is that the synchronization is lost at every change of the received bit; therefore, this synchronization has to be recovered during
0882-Perruquetti-ch11_R2_170805
11.3
Communications with Chaos
435 Correlator
Chaotic Attractor "0"
0
Tb
slave circuit " 0"
s0(t ) m
(⋅) dt Decision circuit
r (t)
1 Chaotic Attractor "1"
Tb
slave circuit " 1"
s1(t )
(⋅) dt
Correlator
FIGURE 11.9 Example of a coherent CSK system.
each bit duration Tb . However, due to the noisy channel and possible mismatches between master and slave systems, the degree of synchronization is not well controlled, in addition to the synchronization time Ts that has to be greater than Tb . Thus the transmission rate is severly limited by this synchronization time as a loss of synchronization produces catastrophic effects on the bit error rate (BER) of the whole system. 11.3.3.2 Noncoherent CSK In noncoherent or asynchronous CSK, the information is carried by the statistical properties of the transmitted chaotic wave. The simplest way to do that is to associate the transmission of a chaotic signal to a bit “1,” and no transmission for a bit “0.” This kind of modulation is name chaotic on– off keying (COOK) and the receiver shown in Figure 11.10 has to measure the variance of the received signal. This type of receiver, measuring the variance of the received signal, is sensitive to the level of noise present at the input of the system. Thus the threshold level of the decision circuit must be adapted to the noise level at the input. This drawback can be eliminated using a differential chaos shift keying DCSK modulation. In this modulation scheme, the slot of time allocated to a bit Tb is divided into two parts. During the first time slot [0 , Tb /2], a reference chaotic signal s(t) is transmitted while during the second slot Tb r(t ) = s(t ) + n(t )
(⋅) dt
Correlator
FIGURE 11.10 Architecture of a COOK system.
Decision circuit
0882-Perruquetti-ch11_R2_170805
436
Chaos and Communications Tb Tb
r (t )
(⋅) dt Tb/2
Decision circuit
Correlator Delay
Tb / 2
r(t − Tb /2)
FIGURE 11.11 Architecture of a DCSK system.
[Tb /2, Tb ] either s(t) or −s(t) is transmitted depending of the value of the information bit to be transmitted. The receiver system has the structure presented in Figure 11.11. The output of the correlator at time t = Tb is given by: Tb R= r(t) · r t − dt 2 Tb/2 Tb Tb Tb +n t− dt R= (−1)m s(t) + n(t) · s t − 2 2 Tb/2
Tb
(11.9)
where n(t) is the noise signal introduced by the propagation channel and m ∈ {0, 1} is the information bit to be transmitted. Thus the integral given in (11.8) can be decomposed into four terms [14] as shown in (11.10). Tb Tb Tb m R = (−1) s(t) · s t − s(t) · n t − dt + (−1) dt 2 2 Tb/2 Tb/2 Tb Tb Tb Tb s t− n(t) · n t − · n(t) + dt (11.10) + 2 2 Tb/2 Tb/2
m
Tb
The first term in (11.10) is equal to ±Eb /2 while the second and third ones are zero. Only the fourth one depends on the bit duration as its variance increases with integration time. Thus in this system the threshold level for the decision circuit does not depend on the noise level at the input of the receiver. However, one disadvantage of the DCSK modulation method is the need for a time slot for transmission of the reference signal during each bit duration. This slows down the transmission rate.
0882-Perruquetti-ch11_R2_170805
11.4
Analysis of a Microwave Chaotic Oscillator
437
11.4
Analysis of a Microwave Chaotic Oscillator
As pointed out in the previous section, the capability of transmitting information in a spread spectrum system requires generation of chaotic signals that are well controlled. Thus the design of chaotic oscillators capable of working in the high-frequency range remains a challenge for engineers [15]. Indeed simple design methods as well as efficient predictive CAD tools remain to be developed. This is due to the fact that synchronization of analog chaotic oscillators is very sensisitive to parameters and distorsions introduced by the transmission channel. Thus the impact of parasitics and real-life nonlinearities that are encountered in practical electronic circuits have to be taken into account. This necessitates simulation of systems or part of the systems at the circuit level. However, for wireless transmissions, the chaotic signals are band limited around the carrier frequency. This complicates the simulation process, as traditional time domain methods are not suitable because of the very different time scales that are involved. Thus we have to resort to mixed time-frequency methods such as the transient envelope method [16]. In this section we will present an example of the simulation of a particular chaotic oscillator which is well suited for band limited chaotic signal generation in the microwave range. It will be shown how the transient envelope technique allows to derive the bifurcation diagram of the oscillator as well as to predict the performances of a chaotic modulator–demodulator system. 11.4.1 Analysis of the Voltage Controlled Oscillator The general architecture of the chaotic oscillator is shown in Figure 11.12. It consists of a microwave voltage controlled oscillator (VCO), associated
Voltage Controlled Oscillator Control Voltage
Output Voltage Nonlinear Feedback Network
FIGURE 11.12 General architecture of the chaotic oscillator.
0882-Perruquetti-ch11_R2_170805
438
Chaos and Communications
with a low-frequency feedback loop. In our case, we will deal with a frequency chaotically modulated oscillator, so the low-frequency loop will involve a frequency discriminator as well as a nonlinear low-frequency filter. Depending of the feedback coefficient, different kinds of regimes can be obtained, ranging from the sinusoidal steady state regime to a hyperchaotic regime.
11.4.1.1
Equations of the VCO
iNL (v1 ) = a · v1 + b · v13 a = b = 1.04072 v1 + vr q1 (v1 ) = Q0 1 + Q0 = 0.7 pC = 0.7 V
(11.11)
R = 5 L = 3.18 nH C2 = 0.133 pF R2 = 20 k The structure of the VCO used in this example is presented in Figure 11.13. It is a simplified Colpitts oscillator where the biasing networks have not been represented for the sake of clarity. A fictitious voltage probe [17] has been added to the circuit, only for simulation purposes. This probe constraints the solution search process to converge to the nontrivial solution. The frequency of the VCO can be adjusted through the nonlinear capacitor control voltage Vr . With the notations shown in Figure 11.13, the
vr Lc is
iL
R
L
ys q1(v1)
es v1
i NL(v1)
FIGURE 11.13 Schematic of the VCO used for the chaotic oscillator.
C2
v2
R2
0882-Perruquetti-ch11_R2_170805
11.4
Analysis of a Microwave Chaotic Oscillator
439
network equations of the oscillator are given by: dq1 (v1 ) − iL − ys ∗ (es (t) − v1 ) = 0 dt dv2 v2 C2 + iNL (v1 ) + + iL = 0 dt R2 L diL + Ri + v − v = 0 L 1 2 dt
(11.12)
The constraint equation ensuring that the voltage probe does not perturb the oscillation condition reads: ys ∗ (es (t) − v1 ) = 0
(11.13)
where ∗ stands for the convolution product. Define the vectors of variables as: T
x¯ = [v1 , v2 , iL ]T , q¯ (¯x) = q1 (v1 ), C2 v2 , LiL , T v2 + iL , RiL + v1 − v2 and f¯ (¯x) = −iL , iNL + R2
T y¯ s = ys , 0, 0 ; e¯s = [E cos(η · ω0 t), 0, 0]T where E and η are, respectively, the amplitude and the reduced frequency of the probe generator which act as two additional variables. Equations (11.12) can be rewritten under the general form: d¯q(¯x) ¯ + f (¯x) + y¯ s ∗ (¯es − v1 ) = 0 dt
(11.14)
which has to be solved under the constraint (11.12) rewritten in vector form y¯ s ∗ (¯es − v1 (¯x)) = 0
(11.15)
Equations (11.14) is then transformed using the decomposition of the time derivative d/dt into partial derivatives versus two virtual time scales tc and te corresponding to the time scales relative to the carrier and the envelope, respectively [18]: d (·) = dt
∂ ∂ + ∂tc ∂te
(·)
(11.16)
0882-Perruquetti-ch11_R2_170805
440
Chaos and Communications
Thus (11.14) becomes: ∂ q¯ (¯x(tc , te ) ∂ q¯ (¯x(tc , te )) + + f¯ (¯x(tc , te )) + y¯ s ∗ (¯es − v1 ) = 0 ∂tc ∂te
(11.17)
Taking the discrete fourier transform of (11.17) versus the time scale tc gives a differential equation on the Fourier coefficients of the nonlinear functions as follows: ¯ X(t ¯ e )) ∂ Q( ¯ X(t ¯ e ) + F( ¯ X(t ¯ e )) + Y¯ s · (E¯ s − X(t ¯ e )) = 0 ¯ 0 Q( + η ∂te
(11.18)
¯ is constituted which is the envelope equation. In this equation, the vector X of the Fourier coefficients of the decomposition of x¯ (t) as: ¯0 + x¯ (t) = X
H
¯ R cos(hηω0 t) − X ¯ I sin(hηω0 t) X h h
(11.19)
h=1
¯ 0 is a block diagonal matrix which reads:
0
0 ¯0 = .. .
0 ω0
···
0 −ω0 0
0 ..
.
0 Hω0
−Hω0 0
(11.20)
Y¯ s is also a diagonal matrix with two nonzero terms: 0 0 .. ¯ Ys = .
0
···
···
Y0
0
···
0 .. .
Y0
0
0 .. .
0 .. .
0 .. . 0 · · · .. .
(11.21)
Thus system (11.18) is constituted of 3 × (2H + 1) nonlinear equations ¯ E, η], and the two constraint equations in 3 × (2H + 1) + 2 unknowns [X, that allow to make the system well conditioned. At each envelope instant te , the system (11.18) is solved using a harmonic balance process organized as a two-tiers procedure. The inner loop
0882-Perruquetti-ch11_R2_170805
11.4
Analysis of a Microwave Chaotic Oscillator
441
solves (11.18) for fixed valued of [E, η] and then these two values are updated in the outer loop to satisfy the constraint equation.
11.4.1.2 Characteristics of the VCO First the envelope equation is solved in the steady state regime for constant envelope conditions (∂/∂te = 0). This gives the classical harmonic balance conditions for oscillators. The local stability of the solution is checked using the generalized eigenvalues approach. This oscillation was found to be stable for the following value of the resistance R = 5 . Then the frequency versus control voltage of the oscillator was obtained for the various steady state conditions corresponding to −8 V ≤ Vr ≤ −1 V. This characteristic is shown in Figure 11.14 and the amplitude of the oscillation versus the control voltage in Figure 11.15.
11.4.2
Equation of the Chaotic Oscillator
Using the previous VCO, the chaotic oscillator [19, 20] is built by adding the low-frequency feedback network shown in Figure 11.16. The output η(t) of the frequency discriminator is proportional to the reduced frequency η(t). The nonlinear filter is constituted by a delay T followed by a nonlinear function that can be realized either in an analog way or digitally with a digital signal processor. This function is the one proposed in Ref. [13] and
f (GHz) 10.8 10.6 10.4 10.2 10.0 9.80 9.60 9.40 9.20 −8
V (Volts) −7
−6
−5
−4
−3
−2
FIGURE 11.14 Frequency of the oscillations of the VCO versus the control voltage.
−1
0882-Perruquetti-ch11_R2_170805
442
Chaos and Communications
0.83
A (Volt)
0.79 0.75 0.71 0.67 0.63 0.59 0.55 −8
−7
−6
−5
−4
−3
−2
−1
Vr (Volts)
FIGURE 11.15 Amplitude of the oscillations of the VCO versus the control voltage.
reads: vc (t) = g(η(t − T)) = β sin2 (α · (η(t − T) − η0 ) − ϕ0 ) + Vc0
(11.22)
where β, α, ϕ0 , and Vc0 are parameters that can be adjusted to produce the desired chaotic signal. The parameter β plays a special role as it controls the degree of feedback that is applied to the loop. For β = 0, the oscillator acts as a purely sinusoidal one and the frequency is adjusted through the value of Vc0 . The loop filter has a time constant τ .
r
VCO
C rC = τ
Output
vc (t ) Frequency Discriminator
g(η (t −T ))
Delay + Nonlinearity
FIGURE 11.16 Chaotic oscillator T/τ = 64 Vc0 = −4 V.
η (t )
0882-Perruquetti-ch11_R2_170805
11.4
Analysis of a Microwave Chaotic Oscillator
443
Introducing the equation of the feedback loop in the general envelope transient equations of the oscillator leads to the following system:
¯ X ¯ (te ) dQ ¯ X ¯ (te ) + F¯ X ¯ (te ) = 0 ¯ (te ) + Y¯ s · E¯ s − X ¯ 0Q + η(te ) · dte ¯ (te ) = 0 Y¯ s · E¯ s − X (11.23) τ
dVr (te ) + Vr (te ) − g (η (te ) − T) = 0 dte
System (11.22) has to be discretized using a full implicit scheme, thus giving the discretized system (11.4.2) at time te = k · te :
1 (k) ¯ ¯ (k) + F¯ (k) X ¯ (k) + Y¯ s · E¯ s(k) − X ¯ (k) X ¯ (k) + η · 0 Q te (k−1) ¯ (k−1) X ¯ Q − =0 te (k) ¯ (k) = 0 Y¯ s · E¯ s − X τ τ (k) (k−1) 1+ Vr − g (η (k · te ) − T) − Vr =0 te te
(11.24)
The discretized system has been solved for different values of the parameters using a software written with Scilab [21]. It gives the time evolution of the oscillation frequency and amplitude. It has to be noticed that the chaotic oscillator is an autonomous system relative to the high-frequency time scale as well as to the low-frequency time scale. To investigate the full behavior of the chaotic oscillator, the bifurcation diagram can be calculated as the parameter β varies. This bifurcation diagram is plotted by sampling the oscillation frequency at instants multiple of the delay T introduced in the loop. Such diagrams are plotted in Figure 11.17 and Figure 11.18, for different values of the parameter α. Inspecting the plot given in Figure 11.17, for α = 314rd shows that for the values β < 0.17 V the oscillator works as a pure oscillator with a frequency decreasing as β increases. Above this value, the steady state regime bifurcates in a two frequency regime between the reduced frequencies
0882-Perruquetti-ch11_R2_170805
444
Chaos and Communications
FIGURE 11.17 Bifurcation diagram of the chaotic oscillator for α = 314rd.
η1 = 1.023 and η2 = 1.028. This regime is illustrated in Figure 11.19 where the transient and the steady state regimes are plotted. It can be noticed that starting from a quasi-chaotic transient the working regime of the oscillator stabilizes to a two-frequency FSK steady state regime (d).
FIGURE 11.18 Bifurcation diagram of the chaotic oscillator for α = 628rd.
0882-Perruquetti-ch11_R2_170805
11.4
Analysis of a Microwave Chaotic Oscillator
445
Further increasing β leads to a second bifurcation which produces a four-frequencies regime and so on, up to the birth of a chaotic regime. For some values of β, regimes with three or five frequencies arise which are typical of a subharmonic route to chaos. One advantage of the analyzed chaotic oscillator is the ability to control the bandwidth of the frequency spectrum by adjusting the value of the parameter β. Indeed if we examine the spectrum of the chaotic oscillator shown in Figure 11.20, one can notice that for the chosen value of β
(a)
Frequency (x10 GHz)
1030e−3 1026e−3 1022e−3 1018e−3 1014e−3 1010e−3 1006e−3 1002e−3
Temps (s)
998e−3 0
(b)
2e−3 4e−3 6e−3 8e−3 10e−3 12e−3 14e−3 16e−3 18e−3
Frequency (x10 GHz)
10280e−4 10276e−4 10272e−4 10268e−4 10264e−4 10260e−4 10256e−4 Temps (s) 10252e−4 0
1e−3
2e−3
3e−3
FIGURE 11.19 Transient set-up of a two-frequencies steady state regime.
4e−3
5e−3
0882-Perruquetti-ch11_R2_170805
446
Chaos and Communications (c) Frequency (x10 GHz) 10279e−4 10278e−4 10277e−4 10276e−4 10275e−4 10274e−4 10273e−4 10272e−4 10271e−4 10270e−4 10269e−4 4e−3
5e−3
6e−3
7e−3
8e−3
9e−3 10e−3 11e−3
(d) Frequency (x10 GHz) 10279e−4 10278e−4 10277e−4 10276e−4 10275e−4 10274e−4 10273e−4 10272e−4 10271e−4 10270e−4 10269e−4 10e−3
11e−3
12e−3
13e−3
14e−3
15e−3
16e−3
FIGURE 11.19 Continued.
(i.e., β = 0.36) the spectrum bandwidth is given approximately by the peak to peak deviation of the reduced frequency times the normalization frequency. BW ≈ η · f0 This result corroborates the Carson rule for frequency modulated signals [22].
0882-Perruquetti-ch11_R2_170805
11.5
Chaotic Modulator and Demodulator
447
FIGURE 11.20 Spectrum of the output signal in the chaotic regime.
11.5
Chaotic Modulator and Demodulator
The previous chaotic oscillator has been used to transmit information signal m(t) by adding it to the feedback signal generated by the nonlinear network as shown in Figure 11.21. In this case, the information signal participates in the dynamics of the oscillator. The control signal of the VCO now satisfies
VCO rC=τ
m(t ) +
Output
vc (t ) Frequency Discriminator
Σ +
g (η (t −T ))
FIGURE 11.21 Architecture of the chaotic modulator.
Delay T + Nonlinearity
0882-Perruquetti-ch11_R2_170805
448
Chaos and Communications Received Microwave signal
η (t)
Frequency Discriminator −1
vd (t) =fVCO(η(t)) +
Σ
m(t)
− Delay T
g(η (t −T ))
+ Nonlinearity
rC = τ
v´c (t )
FIGURE 11.22 Structure of the chaotic receiver (demodulator).
FIGURE 11.23 Transmitted and received signals in the case of a perfect match between parameters.
0882-Perruquetti-ch11_R2_170805
11.5
Chaotic Modulator and Demodulator
449
the equation: τ
dvc (t) + vc (t) = g(η(t − T)) + m(t) dt
(11.25)
where η(t) = fVCO (vc (t))
(11.26)
Under the same conditions as those described in Section 11.4, the frequency of the VCO varies in a chaotic way and the information signal is embedded in the dynamics of the process. The structure of the receiver is shown in Figure 11.22. It consists of a frequency discriminator which has to produce a voltage vr (t) , image of the reduced frequency of the received signal: −1 vr (t) = fVCO (η(t))
(11.27)
FIGURE 11.24 Transmitted and received signals in the case of a 10% mismatch between parameters.
0882-Perruquetti-ch11_R2_170805
450
Chaos and Communications
This frequency discriminator can be produced with a Phase Locked Loop (PLL) using the same VCO as the one used in the emitter part of the MODEM. The voltage vr (t) is applied to the delayed nonlinearity giving:
τ
dvc (t) + vc (t) = g(vr (t − T)) dt
(11.28)
Thus substracting the voltages vr (t) and vr (t) gives the received information message m(t). Synchronization time is equal to the delay time T. Using the model of the chaotic VCO given in the previous section, the chaotic modulator–demodulator can be fully simulated to check the robustness of synchronization versus the parameters mismatches. In Figure 11.23, the comparison of emitted and received information signals are given in the case of a perfect match between parameters. A change of 10% in the receiver parameter β leads to the situation given in Figure 11.24 where the received signal becomes very noisy. Moreover, the BER of such a transmission can be calculated using the transient envelope simulation to give the curve shown in Figure 11.25, where it can be noticed that the BER can be maintained in a range of about 12% for parameter α.
FIGURE 11.25 The BER of the chaotic modulator–demodulator.
0882-Perruquetti-ch11_R2_170805
References
451
References 1. L.M. Peccora and T.L. Caroll, Driving systems with chaotic signals, Phys. Rev. A, 44 (4), 2374–2383, 1991. 2. T.S. Parker and L.O. Chua, Practical Numerical algorithms for Chaotic Systems, Springer-Verlag, Berlin, 1989. 3. G. Kolumban, M.P. Kennedy and L.O. Chua, The role of synchronization in digital communications using chaos—part II: chaotic modulation and chaotic synchronization, IEEE Trans. Circuits Syst. I Fundam. Theory Appl., 45 (11), 1129–1140, 1998. 4. H. Nijmeijer and I. Mareels, An observer looks at synchronization, IEEE Trans. Circuits Syst. I, 44 (10), 882–890, 1997. 5. Y. Liu and P. Davis, Dual synchronization of chaos, Phys. Rev. E, 61 (3), 2176–2179, 2000. 6. M. Hasler, Synchronization of chaotic systems and transmission of information, Int. J. Bifurcat. Chaos, 8 (4), 647–659, 1998. 7. F. Bohme and W. Schwarz, The Chaotizer–Dechaotizer channel, IEEE Trans. Circuits Syst. I, 43 (7), 596–599, 1996. 8. G. Mazzini, G. Setti and R. Rovatti, Chaotic complex spreading sequences for asynchronous DS-CDMA—Part I: system modeling and results, IEEE Trans. Circuits Syst. I, 44 (10), 937–947, 1997. 9. Heidari-G. Bateni and C.D. McGillem, A chaotic direct-sequence spread spectrum communication system, IEEE Trans. Commun., 42 (2–4), 1524–1527, 1994. 10. T. Yang and L.O. Chua, Chaotic digital code division multiple access communications systems, Int. J. Bifurcat. Chaos, 7 (12), 2789–2805, 1997. 11. F. Dachselt and W. Schwarz, Chaos and cryptography, IEEE Trans. Circuits Syst. I, 48 (12), 1498–1509, 2001. 12. S. Penaud and P.H. Bouysse, DSP implementation of self-synchronised chaotic encoder decoder, Electron. Lett., 36 (4), 365–366, 2000. 13. L. Larger, J.P. Goedgebuer and F. Delorme, Optical encryption system using hyperchaos generated by an optoelectronic wavelength oscillator, Phys. Rev. E, 57 (6), 6618–6624, 1998. 14. G. Kolumban and M.P. Kennedy, The role of synchronization in digital communications using chaos—part III: performance bounds for correlation receivers, IEEE Trans. Circuits Syst. I, 47 (12), 1673–1683, 2000. 15. C.P. Silva and A.M. Young, Implementations and uses of high frequency chaoric oscillators, in Proceedings of the WS7 Nonlinear Phenomena in Microwave Electronic Circuits and Chaos: Analysis and Applications, 30th EuMC , Paris, October, 2000. 16. E. Ngoya and R. Larcheveque, Envelope transient analysis: a new method for the transient and steady state analysis of microwave communication circuits and systems, in Proceedings of the IEEE MTT’96 TH2B2, 1996. 17. R. Quéré, E. Ngoya, M. Camiade, A. Suárez, M. Hessane and J. Obregon, Large signal design of broadband monolithic microwave frequency dividers and phase-locked oscillators, IEEE Trans. Microwave Theory Tech., MTT-41 (11), 1928–1938, 1993.
0882-Perruquetti-ch11_R2_170805
452
Chaos and Communications
18. H.G. Brachtendorf, G. Welsch, R. Laur and Bunse-A. Gerstner, Numerical steady state analysis of electronic circuits driven by multi-tone signals, in Electrical Engineering, Vol. 79, Springer Verlag, 1996, pp. 103–112. 19. J. Guittard, S. Penaud, J.C. Nallatamby and R. Quéré, Full analysis of a chaotic microwave oscillator for use in a FM-CSK communication system, Int. J. RF Microwave Comp. Aided Eng., 12 (5), 469–474, 2002. 20. J. Guittard, Techniques d’analyse d’oscillateurs chaotiques: application aux télécommunications par synchronisation de chaos, PhD Thesis, Université de Limoges, France. 21. Scilab available at http://www-rocq.inria.fr/scilab/. 22. R.E. Ziemer and W.H. Tranter, Principle of Communications, Houghton Mifflin Company, Boston, 1976.
0882-Perruquetti-ch12_R2_170805
12 Chaos, Optical Systems, and Application to Cryptography L. Larger
CONTENTS 12.1 From Chaos to Cryptography through CDMA . . . . . . . . . . . . . 12.1.1 Basic CDMA Principles . . . . . . . . . . . . . . . . . . . . . . . . . 12.1.2 Similarities with Chaotic Behavior . . . . . . . . . . . . . . . . . 12.1.3 A Typical Transmission System Using Chaos Encryption 12.2 Which Dynamical System for Encryption? . . . . . . . . . . . . . . . . 12.2.1 Required Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.2.2 Nonlinear Dynamics Classification . . . . . . . . . . . . . . . . 12.2.3 Nonlinear Delayed Differential Dynamics . . . . . . . . . . . 12.3 NLDDE Performed in Optics and Optoelectronics . . . . . . . . . . 12.3.1 The Ikeda Ring Cavity . . . . . . . . . . . . . . . . . . . . . . . . . . 12.3.2 Physical Principles Involved in the NLDDE Set-Up . . . . 12.3.2.1 Amplitudes . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.3.2.2 Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.3.3 Optoelectronic Set-Ups Using the Laser Wavelength . . . 12.4 Coding–Decoding Information in Chaos . . . . . . . . . . . . . . . . . 12.4.1 Masking Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.4.2 Synchronization and Decoding Principles . . . . . . . . . . . 12.4.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 12.5 Confidentiality and Cryptanalysis Approach . . . . . . . . . . . . . . 12.5.1 Key-Space Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . 12.5.2 Dynamics Identification from Time Series . . . . . . . . . . . 12.6 Other Optical Set-Ups for Encryption . . . . . . . . . . . . . . . . . . . 12.6.1 Chaotic Laser Intensity Using Electro-Optic Devices . . . 12.6.2 Chaotically Coherence Modulated Light Beam . . . . . . . . 12.6.3 “All-Optical” External Cavity Laser Diode . . . . . . . . . . . 12.6.4 Direct Optoelectronic Feedback in SC Lasers . . . . . . . . .
454 454 455 456 457 457 457 458 461 461 462 462 463 463 467 467 468 470 472 472 472 473 473 474 475 476 453
0882-Perruquetti-ch12_R2_170805
454
Chaos, Optical Systems, and Cryptography
12.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
12.1
From Chaos to Cryptography through CDMA
Chaos might be considered, from different points of view, as a fascinating subject of research, as a perturbing phenomenon that one wants to get rid off, or also as an interesting deterministic behavior whose properties can be of great interest if it can be understood and controlled. Regarding the last situation, chaos-based encryption has become one of the most important fields of applied research of the chaos theory in the last decade, since it appeared to be a promising and original practical application, as well as a sought after and in-demand field of research in the current communication- and information-driven society. More and more transmitted data are indeed requiring a certain level of confidentiality: private mobile phones, Internet transactions, medical data transfer, bank information exchange, etc. Cryptography has moved very recently from being quite a limited field of concern (diplomacy, national security, and military applications) to a very wide area concerning nearly everyone, thus requiring a high bandwidth encryption capability. Although code division multiple access (CDMA) and chaos-based encryption are communication techniques that have been developed independently at very different times, one could easily have thought they were tightly connected due to the similarity existing in the involved principles. This similarity is actually so strong that a current research topics in chaos theory applications concerns the improvement of CDMA efficiency through the use of chaotic dynamic (see Chapter 11). In this section, we will first describe briefly the principles involved in CDMA, and then we will emphasize on the similarities between CDMA and encryption using chaos, as an introduction to chaos-based encryption principles.
12.1.1
Basic CDMA Principles
CDMA is a spread spectrum digital communication technique, meaning practically that the spectrum of the transmitted binary signal (carrier with the information) is much wider than the one of the information. At first sight, this should not represent a very efficient character of this particular transmission technique. However, it is also possible to transmit simultaneously and on the same bandwidth, different channels, thus reducing the
0882-Perruquetti-ch12_R2_170805
12.1
From Chaos to Cryptography through CDMA
455
effective frequency cost per channel. This particular property of possible time–frequency coexisting channels is related to the fact that the carrier, in contrast to conventional modulation techniques based on sine waveforms, consists in a pseudo-random binary sequence (of finite length): it forms the code defined for one channel. Each bit of the message is XORed with the pseudo-random bit sequence, thus performing the CDMA modulation: the random bits being much faster than the message bits, the message spectrum is at the same spread through the code randomness, as well as shifted toward higher frequencies corresponding to the code bit frequency. The demodulation process involves a second logical XOR operation, with the same pseudo-random binary sequence, the code. At this stage, the code appears to be equivalent to a key: the demodulation is indeed quite a hard task if the code used at the modulation process is not known for demodulation. In other words, the binary sequence provides a carrier means as well as an encryption means at the same time. Complex theoretical criteria allow the definition of an optimal deterministic codes generation method, corresponding to the so-called “Goldsequence.” This sequence is a huge random binary sequence, from which each code of each channel is picked. Typical applications of CDMA are GPS signals and the modulation techniques of the third-generation mobile phones.
12.1.2
Similarities with Chaotic Behavior
Chaotic dynamics should now appear more obviously as potential candidates for pseudo-random carriers, providing both an information carrier capability for transmission as well as an encryption function. Through their low predictability or sensitivity to initial conditions they exhibit the random character of interest. In other words, they exhibit wider spectra when compared with traditional periodic waveforms, thus fulfilling the spread spectrum nature earlier described for CDMA. In contrast, chaotic dynamics are intrinsically deterministic since they are generated by differential equations, similarly to the fact that the CDMA codes are practically produced by well-defined and optimized algorithms (e.g., the Gold sequence). The determinism is of great importance when designing the decoder, involving, for example, synchronization techniques between local and distant chaotic waveforms. CDMA decoding techniques also involve such synchronization procedures. However, the analogy between CDMA and the chaotic optical encryption systems of concern here, should not be taken too far, as there are currently still some fundamental differences between them. CDMA is an older and quite mature communication technique and it is already applied on a wide scale. CDMA is mainly a digital technique, whereas chaos-based
0882-Perruquetti-ch12_R2_170805
456
Chaos, Optical Systems, and Cryptography
encryption system deals mainly with analog signals. The chaotic sequences of concern are of nearly infinite length when compared with the finite length of CDMA codes. Chaotic secure communication systems do not yet pretend to compete with CDMA, as one will notice that the systems reported in the next sections are still under development. We will now concentrate on chaos-based encryption in optics.
12.1.3 A Typical Transmission System Using Chaos Encryption Figure 12.1 represents the bloc diagram of a typical information transmission system secured by chaotic waveforms. The emitter used by Alice consists of a chaos generator providing the chaotic carrier and a mixing bloc whose role is to hide the information message inside the chaotic waveform. The resulting signal is transmitted to the authorized receiver, Bob, who owns an adequate decoder. That decoder consists of a second nearly identical chaos generator and a synchronization bloc. Synchronization is the most critical step in the decoding procedure. If the locally generated chaos is synchronized with the one received from the emitter, the extraction of the information is then usually performed through quite a straightforward operation, typically a subtraction. Of course, since we are claiming the transmission is secure, the figure also takes into account that the line might be tampered by an unauthorized person, Eve (the eavesdropper). The following sections will detail nearly in the same order the different operations just described. We will first discuss the chaos generator chosen, and its particular dynamical properties in the context of encryption.
FIGURE 12.1 Typical transmission system using chaos encryption.
0882-Perruquetti-ch12_R2_170805
12.2
Which Dynamical System for Encryption?
457
Practical realizations of the chaos generator in optoelectronics will be reported, as well as experimental characterization. Coding and decoding problems will then be addressed by illustrations with experimental results. Finally some notions on security and cryptanalysis will be discussed before concluding and reporting some current research on other optical systems for chaos-based encryption systems.
12.2
Which Dynamical System for Encryption?
First of all, we will describe and justify the particular type of dynamical systems that have been chosen in most of the chaos-based optical encryption systems.
12.2.1
Required Properties
Among the numerous experimental set-ups capable of generating chaos, one has to choose the most efficient one for encryption purposes. Of course, the chaotic dynamic should be as complex as possible, so that, for example, it can be very difficult for Eve to analyze it and find out the underlying determinism. In contrast, the set-up should not be too complicated, so that designing an efficient decoder is not a task too hard, assuming the “key” parameters are known. A simple design is also sometimes required for stability properties of the encoding and decoding process.
12.2.2
Nonlinear Dynamics Classification
Table 12.1 is a kind of classification [1] of various dynamical systems, according to their discrete, continuous, invertible, and noninvertible nature (rows), and also with respect to their phase space dimension (columns). Each box of the table is filled with the most complex possible dynamical behavior corresponding to a given row and a given column. TABLE 12.1 Dynamics Classification
Flow Invertible Map Noninvertible Map
1
2
3
...
∞
Fixed Point Torus Chaos
Torus Chaos …
Chaos … …
… … …
Chaos Chaos Chaos
0882-Perruquetti-ch12_R2_170805
458
Chaos, Optical Systems, and Cryptography
According to this table, the criteria of a complex behavior would correspond to last column (high-dimensional phase space), and the simplest structure that would still be able to exhibit a chaotic behavior would be represented by the first column and last row (noninvertible map in one-dimension). Although both criteria seem to be difficult to fulfill simultaneously, there exists a particular and unusual class of dynamical systems which might exhibit features in terms of behavior complexity as well as system simplicity: the nonlinear delay differential dynamics. This kind of dynamics is located precisely in the last column in Table 12.1 due to the presence of a delay. Surprisingly, however, the minimum number of physical dynamical variables required to produce such a chaos can be as low as 1, as it is for a discrete mapping. It is also important to notice that the dynamics is a flow, thus corresponding to a real-world physical system and not a numerical one.
12.2.3
Nonlinear Delayed Differential Dynamics
A typical mathematical writing of that particular dynamics is given in Equation (12.1): dy (t) = f [y(t), y(t − T1 ), y(t − T2 ), . . .], dt
(12.1)
where y is the physical dynamical variable (it can be scalar or vectorial), and f [·] is a nonlinear transformation depending on y at time t, but also on y at the moments delayed in time by the quantities Ti (i = 1 to n, and Ti are ordered with decreasing values of the delay). Regarding state space dimension, it is now clear that it has to be infinite according to the initial conditions required to uniquely determine a phase space trajectory: one would require not only the components (in finite number) of the initial value y(t0 ) but also all (in infinite number) the continuous time variations of those components on a time length T1 (the largest delay). When considering only a scalar dynamical variable (first-order dynamics) and a single time delay involved in the arguments of the nonlinear function, we obtain the simplest form of a nonlinear delay differential equation (NLDDE): τ
dy (t) + y(t) = β · f [y(t − T)] dt
(12.2)
where τ is a time scaling factor representative of a physical response time of the real system. In the following, we will only consider the large delay case, for which T is large when compared with τ . Although the small or comparable delay case might also be of interest in other situations, in our encryption application we are seeking a dynamical system capable of
0882-Perruquetti-ch12_R2_170805
12.2
Which Dynamical System for Encryption?
459
high-complexity chaotic behavior whose phase space dimension is related to the delay (size of the initial conditions). It is important here to notice that in the large delay case, one can obtain, with such NLDDEs, very high complexity chaotic behaviors, with attractor dimension as high as several hundreds (to be compared with the dimensions lower than 3 for the attractors of the Lorenz type). In Equation (12.2), the delayed feedback nature of the dynamics appears more clearly. The linear differential operator in the time domain [τ d/dt + Id] is indeed the consequence of a first-order filter with the well-known Laplace transform 1/(1 + τ p). The bloc diagram of the physical system modeled by Equation (12.2) is depicted in Figure 12.2. It consists of a pure delay line generating a time delay T constant for each frequency (no dispersion), a nonlinear transformation f [·], a linear low pass filter with a cut-off frequency fc = 1/2π τ , and a linear amplifier with a gain β. The gain β is a multiplicative factor for the nonlinear function, thus acting in the feedback as a weight of the nonlinear transformation. In many situations, β is used as a bifurcation parameter, since it measures the importance of the nonlinear action in the feedback process. For low values of β, the system can be linearized, thus recalling a basic harmonic oscillator, for which the gain condition can be fulfilled through β, and the phase condition depends on the delay. Because of the large delay, the phase condition is easily met for many frequencies, and hence, the most crucial point to start an oscillation from a stable steady state is to have enough gain. While increasing β, the nonlinear transformation is more and more important in the actual dynamic, till the chaotic regimes. As depicted in Figure 12.3, a typical period doubling route to chaos is observed in the bifurcation diagram, while increasing β from zero (the horizontal axis is β, the vertical one corresponds to the visited amplitudes of y for a given dynamical regime, the gray scale encodes the probability density of y).
FIGURE 12.2 Bloc diagram of the scalar nonlinear delayed dynamic.
0882-Perruquetti-ch12_R2_170805
460
Chaos, Optical Systems, and Cryptography
FIGURE 12.3 Bifurcation diagram calculated from Equation (12.2).
Another qualitative approach sometimes used for the scalar NLDDE involves the so-called adiabatic approximation. Although this approach cannot be quantitative, it might be of interest while looking for the first time at the instability phenomenon that might occur for a given nonlinear function f [·]. If we assume in Equation (12.2) that time derivatives can be neglected most of the time, then the system reduces to a mapping, since we have y(t) = β · f [y(t − T)]. Supposing the trajectory corresponds to constant values of y on successive time intervals of duration T, and denoting this value on the nth interval yn , we obtain the mapping yn = β · f (yn−1 ). When β f [·] is replaced by the reverse parabola, a mapping corresponding to the logistic application is obtained. Exploring the different steady states and the values reached during any periodic behavior are then found classically, when studying the fixed points of the p-iterated function β f [·]. The main difference from the logistic map is that in the practical cases corresponding to the experiments, the function f [·] exhibits several extrema. This is of great importance in terms of the complexity of the actually observed dynamical regimes. The adiabatic approximation (Figure 12.4) is practically valid only for low complexity regimes, like the steady states, the 2T and 4T periodic regimes, for which the experimental behavior corresponds effectively to square waveforms between plateaus (on which the condition [d/dt small] is easily verified). For higher values of β (i.e., for higher complexity regimes), the transients where the time derivative reaches large values plays an important role, and the regimes obtained with the mapping are significantly different from the ones obtained with the flow (NLDDE). As an example, the period-3 window observed on the mapping in Figure 12.5 is not present (at least at the same position) in the case of the continuous time NLDDE bifurcation diagram in Figure 12.3.
0882-Perruquetti-ch12_R2_170805
12.3
NLDDE Performed in Optics and Optoelectronics
461
FIGURE 12.4 Bloc diagram in the adiabatic approximation situation.
FIGURE 12.5 Bifurcation diagram calculated from a mapping using β f [·].
12.3
NLDDE Performed in Optics and Optoelectronics
Following the scheme described in the previous section, we developed different experimental set-ups intended to perform chaos generators described by NLDDEs. All of these set-ups are inspired by a brain experiment initially proposed and numerically explored by Kensuke Ikeda in the early 1980s [2].
12.3.1 The Ikeda Ring Cavity The experiment is depicted in Figure 12.6. The feedback is performed all optically in a ring cavity with two partially reflecting mirrors (input and output mirrors in the top of the figure) and two totally reflecting mirrors (the two mirrors in bottom of the figure). The nonlinear transformation
0882-Perruquetti-ch12_R2_170805
462
Chaos, Optical Systems, and Cryptography
FIGURE 12.6 The Ikeda ring cavity.
can be performed differently through the interaction of the light beam inside the cavity with a two-level atomic cell. One way is to benefit from a refractive index change in the cell with respect to the light intensity (thus changing the total optical path viewed by the beam inside the cavity: the so-called Kerr effect). The light intensity is actually determined by the interference between the input light beam and the feedback light beam. But the later interference condition depends also, through the feedback, on the total optical path in the cavity determined by the previous refractive index change in the cavity. The nonlinear function then corresponds to the interference figure between two waves having a phase difference ; the interference intensity is thus a cosine function with respect to the phase difference generated by the optical path through the cavity. The iteration process occurs with a time scale corresponding to the traveling time of the beam through the cavity; the delay is thus generated via a traveling wave through a medium of a fixed length. The observed quantity is the output intensity resulting from the interference in the cavity at time t. Ikeda showed that this output intensity has a dynamic which can be described, under some assumptions, by an equation of the same type as Equation (12.2). An important parameter is the constant input laser intensity I0 , which determines how strong the light–matter interaction in the atomic cell can be. For low input intensity, a stable steady state is observed, while period doubling appears for an increasing input intensity. For high enough intensity, the output becomes chaotic.
12.3.2
Physical Principles Involved in the NLDDE Set-Up
12.3.2.1 Amplitudes Let us go back to the bloc diagram in Figure 12.2. Instead of considering the linear element between x and y as an amplifier, one could treat it as a conversion bloc between two physical variables of different nature. The
0882-Perruquetti-ch12_R2_170805
12.3
NLDDE Performed in Optics and Optoelectronics
463
systems we are considering in optics are not only described by an optical intensity or a refractive index but also wavelength, optical phase, or optical path difference might be involved in the physical set-up; even voltage or current is of concern with optoelectronic systems. This difference in the nature of the variables is actually imposed by the physics involved in the set-up: we want a highly nonlinear behavior as well as a feedback system which reacts on itself after a delay (the latter implies that the physical nature of the feedback signal has to be the same as the input of the nonlinear function). More precisely, the linear conversion bloc from x to y is performed by the Kerr effect which relates the intensity (x) and the refractive index change, or equivalently the optical path difference change (y); the nonlinear transformation occurs precisely between the same variables, since the cosine output is the intensity (x) whereas the input is the optical path change (y). 12.3.2.2 Times As already noticed in the equations, the time scales are dual. One is related to the delay generated by the traveling wave (approx. 1 or 2 m in the air, hence T 3 − 10 nsec), and the other one corresponds to the slowest physical response time involved in the feedback. In the optical ring cavity, this limitation occurs on very short time scales τ , since light–matter interaction in the atomic cell can be as fast as a few picoseconds or femtoseconds. The Ikeda cavity then corresponds effectively to the large delay case of the NLDDE systems. In the latter case, the presence of very short time scales is one of the main reasons why the Ikeda set-up is mainly a mental experiment, since signals would have been too fast to be properly managed; another is that the optical intensity required for a significant Kerr effect has to be actually very high compared to conventional optical power levels.
12.3.3
Optoelectronic Set-Ups Using the Laser Wavelength
In the mid-1990s, our group explored the possibility of experimentally performing the Ikeda ring cavity, but involving unusual optoelectronic means: with the recently available wavelength tunable semiconductor laser. The initial idea [3] was to modulate an optical interference situation not through the refractive index change (as in the Ikeda experiment) but through the wavelength change. The phase shift between two waves can be indeed written as 2π /λ, where is the optical path difference, and λ is the wavelength usually considered as a constant parameter. In our set-up, the aim is to obtain chaotic fluctuations of the wavelength of a laser λ(t). The corresponding set-up is depicted in Figure 12.7 [4].
0882-Perruquetti-ch12_R2_170805
464
Chaos, Optical Systems, and Cryptography
FIGURE 12.7 The wavelength chaos generator.
The main element of the wavelength chaos generator is the tunable twosection DBR semiconductor laser. One electrode adjusts the laser power through the current i1 as usual, and the other can be used to tune continuously and linearly the wavelength around 1.55 µm through another current i2 , over a 2 nm range. This particular source converts an input current i2 (x) linearly into an output wavelength deviation δλ (y) around the central wavelength λ0 . Next, the nonlinear transformation is performed similarly to the Ikeda ring cavity case, with a two-waves interferometer, performed here by a birefringent plate placed between two crossed polarizers. This interferometer nonlinearly converts the input wavelength fluctuation into an optical intensity fluctuation, according to a sine law, typically: f [y] = sin2 [y + 0 ]
(12.3)
where y is proportional to δλ and 0 is related to the central wavelength λ0 . It is to be noticed that the system is not restricted, in principle, to the nonlinear function profile given in Equation (12.3), since any optical filter operating in the same spectral range and exhibiting at least one extremum can produce a chaotic behavior; the actual number of the sine extremum (Equation (12.3)) involved experimentally can be as high as 14, whose feature is important to obtain high-complexity chaotic dynamics. To perform the feedback, the output signal has to be compatible with the tuning current i2 : this is fulfilled simply through the detection of the optical power fluctuations with a photodiode, thus producing a photo-current proportional to the nonlinear transformation. The previous optoelectronic part of the oscillator allowed us to define most of the amplitude elements (linear conversion, nonlinear transformation, compatibility of the signals nature). The temporal
0882-Perruquetti-ch12_R2_170805
12.3
NLDDE Performed in Optics and Optoelectronics
465
characteristics are determined by the electronic feedback. The first-order dynamical process, as written in the left-hand side in Equation (12.2), is performed by an active first-order low pass filter working in the audio range (τ 8.7 µs). To perform a large delay NLDDE, we had to carry out a delay line with a long delay, typically 512 µsec, thus producing a ratio T/τ of about 60. This was achieved electronically instead of using a very long fiber line; a CCD-based analog FIFO memory of 1024 elements was used for this, thus generating a delay that can be accurately tuned through an external clock frequency. A tunable electronic amplifier is also used in the electronic feedback as a means for adjusting the bifurcation parameter value (i.e., the overall weight of the nonlinear signal fed back to the tunable laser). Numerous different dynamical regimes can be obtained while increasing (from the top to the bottom) the electronic feedback loop gain; some of them are reported with their FFT spectra in Figure 12.8. They correspond to different fixed values of the bifurcation parameter (the overall feedback gain). Periodic regimes are obtained for low values of β, with their typical line spectra. The first periodic regime observed while increasing β from zero is usually a square wave with a period of nearly 2T, and the next stable periodic regime in the period doubling cascade gives rise to subharmonic
FIGURE 12.8 Experimental trajectories in time and frequency domain.
0882-Perruquetti-ch12_R2_170805
466
Chaos, Optical Systems, and Cryptography
frequencies (period 4T) as depicted in the first top experimental record; the next 2n T periodic oscillations are difficult to observe experimentally due to noise and due to a small separation of the oscillation levels. After the period doubling cascade, a kind of inverse cascade can be recognized, consisting of a 2n T carrier (n is now decreasing with increasing β) with small chaotic fluctuations on each level of the square carrier waveform. The middle trace in Figure 12.8 represents such a 2T carrier with the characteristic chaotic fluctuations superimposed to the plateaus. When β is large enough, the so-called fully developed chaos is obtained (bottom traces in Figure 12.8), where no periodic background can be seen in the spectrum, but only a high level noisy, and nearly flat, spectrum is observed within the entire oscillator bandwidth. Such chaotic regimes are of course of great interest in our application to encryption. They are obtained for many different values of the bifurcation parameter, provided it is sufficiently high. When β is slowly increased in time, and when using an analog oscilloscope, it is possible to obtain an experimental bifurcation diagram in the same way as the ones obtained numerically in Figure 12.3 and Figure 12.5. The mean spot trace intensity along the vertical axis of the oscilloscope screen is then representative of the dynamical variable probability density. The resulting photography of such an oscilloscope screen is represented in Figure 12.9, for different values of the parameter λ0 , the central wavelength
FIGURE 12.9 Experimental bifurcation diagrams.
0882-Perruquetti-ch12_R2_170805
12.4
Coding–Decoding Information in Chaos
467
of the laser. The first bifurcation diagram in the figure should be compared with the numerical one in Figure 12.3, since the experimental parameters were carefully adjusted to the same values as in the simulations. Figure 12.9 shows that many different bifurcations can arise by slightly changing some parameters of the system. In the same vein, it is possible to generate many different chaotic regimes when choosing different parameter values, each of these constituting the key of the encryption process.
12.4 12.4.1
Coding–Decoding Information in Chaos Masking Techniques
Most of the systems developed so far perform an encryption through an additive masking of the message inside the chaotic carrier. “Masking” means that the amplitude of the message is smaller than the one of the chaotic signal. The transmitted signal is thus nearly identical to the chaotic signal, which is chosen to appear as close as possible to a real noise; it should then be quite difficult for Eve to recognize any message in the transmitted signal. The first idea of the pioneering work of Pecora and Carroll [5] was to perform additive masking outside the chaotic oscillator (i.e., that the chaotic oscillation is generated completely independently of the message). The main drawback of that solution was that intrinsically the message had the same role as any additive noise introduced in the transmission channel. The technique is thus extremely sensitive to noise induced by the channel. Another possibility is the one chosen in the wavelength chaos emitter in Figure 12.7, where the signal is added inside the oscillation loop (see the adder before the feedback on the laser tuning electrode). Since the message amplitude is small, it acts only as a small perturbation on the chaotic oscillation, which keeps its general noise-like properties in the presence of the message. The message insertion using an adder in the feedback loop is equivalent to the modulation of the parameter 0 in Equation (12.3). Note that in principle any other parameter (e.g., β or T) of the dynamics can be chosen to mix the message with the chaotic carrier, but the decoding technique then strongly depends on it. For this particular reason, the technique for mixing the message with the chaos is sometimes called “chaos modulation.” In some situations, the transmitted message is binary, because there does not exist any demodulation technique to retrieve an analog message. The term CSK for chaos shift keying is then found in the literature [6]. We will next explain the decoding technique relative to the additive chaos modulation technique, which is the most common and the simplest one
0882-Perruquetti-ch12_R2_170805
468
Chaos, Optical Systems, and Cryptography
for the demodulation, and for which both analog and digital decoding are possible.
12.4.2
Synchronization and Decoding Principles
The term “synchronization” is employed here because it is currently used in the literature, but it does not seem to be the correct term. A synchronization somehow means that a receiver owns at least a certain level of independence with respect to the emitter. In the situation described here, chaos replication [7] would be more appropriate, since the receiver is completely coupled to the signal transmitted by the emitter. Assume first that no message is involved in the emitter. The proper decoder would consist of a nontrivial system giving at the output a null signal (no message), while using the chaotic waveform as the input, and generating from this signal, another one which is identical (i.e., synchronized or more rigorously replicated). The emitter–receiver replication principle is illustrated in Figure 12.10 using blocs similar to the ones used in Figure 12.2 (except for the linear filter, which is replaced by its impulse response, thus generalizing the low pass filter situation to any kind of linear filter). First it can be seen that the same elements are present at both sides. Second, the main difference relies on the fact that the receiver has an open-loop architecture and hence cannot produce any oscillation without external signal. The receiver could hence be called a passive nonlinear delayed dynamical process, whereas the emitter would be an active one due to its feedback. The external signal coming into the receiver is actually the one generated by the emitter, which serves as a continuously updated initial condition for the passive dynamical process of the receiver. If the elements in the receiver are exactly the same as the ones in the emitter, it is then clear that with the same initial conditions (continuously updated at the receiver), both should produce the same signal. More rigorously, the
FIGURE 12.10 Bloc diagram for chaos replication and decoding.
0882-Perruquetti-ch12_R2_170805
12.4
Coding–Decoding Information in Chaos
469
signal generated by the receiver can be written in an integral form using the impulse response of the linear filter: λe (t) = [he ]θ [ Fe (λe )]θ−Te (t) = he (t − θ ) · Fe [λe (θ − Te )] dθ (12.4) Following the same idea and according to the description of the receiver, the equations for the replicated wavelength is: λr (t) = [hr ]θ [ Fr (λe )]θ−Tr (t) = hr (t − θ ) · Fr [λe (θ − Tr )] dθ. (12.5) It then becomes obvious that λr (t) = λe (t) if we have hr (·) = he (·), Fr (·) = Fe (·) and Tr = Te . The replication is then perfect and stable against small perturbations (because the receiver is passive). The time required for the replication to occur is related to the delay, but the emitter and the receiver chaos remain identically the same as long as there is no interruption on the transmission line (to maintain the same initial condition for the dynamical process). Equation (12.4) and Equation (12.5) can also be used to evaluate the influence of the unavoidable small mismatches when experimentally adjusting the parameter of the receiver with the ones of the emitter [8]. These equations are used to compute (in dB) the relative RMS replication error with respect to the chaos RMS amplitude: [λe (t) − λr (t)]2 (ε)dB = 10 log (12.6) [λe (t) − λe (t)]2 This error is represented in Figure 12.11 for mismatch on the parameter β and 0 [see Equation (12.2) and Equation (12.3)]. It can be seen that a
FIGURE 12.11 Replication error against parameter mismatch.
0882-Perruquetti-ch12_R2_170805
470
Chaos, Optical Systems, and Cryptography
small percentage can be tolerated for a decoding noise error lower than −30 dB. However, the tolerance is not exactly the same for each parameter, especially for the delay. This fact can be explained as follows. Since we are requiring an exact temporal replication with signals varying with a typical time scale τ , the delay has to be adjusted approximately with the precision of small percentage of τ , but not of T. In the large delay case, the ratio T/τ might be rather high, and hence the tolerance for T is given by δT/T (δτ/τ )/(T/τ ). A typical precision of 0.01% is required in the experiment for the parameter T, which is known to be the most critical one. Consider now that a message is added inside the emitter oscillation loop. Using a similar way as for the replication, it can be found that the message is recovered at the receiver when we subtract from the received signal (the one that contains the message) the replicated chaos (the one generated by the receiver). The recovered message is of course superimposed on a decoding noise due to the parameter mismatch. An important consequence of the limited accuracy in the emitter–receiver matching is that the message cannot be hidden in the chaos at the emitter with an amplitude smaller than the decoding noise, otherwise the message cannot be correctly recovered. This leads to a compromise between the masking efficiency (how deep the message is masked in the chaos, the message-to-chaos ratio: MCR < 1) and the decoding quality (how good the message is recovered, the signal-tonoise ratio: SNR at the decoding >1): Chaos = SNRdB − MCRdB (12.7) Error dB One should try then to have as good matching as possible, but also a chaos with as much energy as possible.
12.4.3
Experimental Results
Figure 12.12 represents the wavelength chaos decoder set-up. When compared with the emitter set-up in Figure 12.7, the main difference is the absence of a tunable DBR laser at the receiver. This is actually not required, since the subtraction between the received chaos and the one locally generated is performed electronically (subtracting wavelengths is not simple!). As the DBR laser is considered as a linear element (between the input current and the output wavelength), we have designed an optoelectronic wavelength detector (the reciprocal function of the DBR laser), using the linear part of a spectral filter. Wavelength fluctuations are thus converted linearly into optical intensity fluctuations, the latter being detected by a photodiode; an electrical current proportional to the input beam wavelength is then generated. This electrical signal enters the negative input
0882-Perruquetti-ch12_R2_170805
12.4
Coding–Decoding Information in Chaos
471
FIGURE 12.12 Set-up of the wavelength chaos receiver–decoder.
of the subtractor, the chaos replicated by the receiver being the positive input (replication is processed via the duplicated emitter elements, the wavelength nonlinearity, the detector, the time delay, and the filter). Figure 12.13 corresponds to experimental traces when a sine waveform is encoded inside the chaos. The upper traces are in the time domain, and the lower ones are the corresponding spectra. The left traces represent the signals available on the transmission line, they exhibit the characteristics of a noise (wide and flat spectrum); a cursor indicates the position of the frequency in the spectrum which is properly hidden in the chaos. The traces on the right side are the decoded signals at the emitter. The sine waveform is clearly recovered in the time domain as well as in the frequency domain. The spectrum also allows to measure the background noise level
FIGURE 12.13 Experimental traces while encoding and decoding a sine waveform.
0882-Perruquetti-ch12_R2_170805
472
Chaos, Optical Systems, and Cryptography
which is due to the parameter mismatch. An SNR of about 25–30 dB can be measured, but recent advances with another optoelectronic set-up allowed to match more accurately the different parameters, resulting in an SNR of nearly 40 dB.
12.5 12.5.1
Confidentiality and Cryptanalysis Approach Key-Space Dimension
According to the previous principles, the most important thing to know for the decoding is the values of the different parameters pi involved in the chaos generation process. Those values do not actually need to be exactly known, only a finite precision δpi is required. Assuming an exhaustive search of each parameter value pi with a corresponding precision δpi , the number of bit equivalents to the encryption key is deduced from: Nb = log2 [pi /δpi ]. A typical number of bits for the system described by Equation (12.2) and Equation (12.3) would give approximately 50, which is a relatively small number compared with the usual ones in the algorithm-based technique (key of 256 bits length [9]). However, the encryption principle does not imply a fixed nonlinear function profile, neither theoretically nor experimentally. As already pointed out, any optical filter profile exhibiting at least one extrema is enough to generate a high complexity chaotic carrier. Slightly more complex chaos generator architecture can be considered, involving several feedback loops with different nonlinear functions, different delays, and different dynamical processes. Taking all this into account would easily increase the key length above 1000.
12.5.2
Dynamics Identification from Time Series
Similarly to algorithm-based encryption systems, the exhaustive search is usually not the optimal one for Eve. She may find other analysis techniques using the so-called “cypher text” (the signal available on the transmission line), to retrieve those parameters. Some particular equations (e.g., the Mackey–Glass [10]) of the general form (12.2) have already been extensively studied from the time series point of view [11, 12]. The consequence is that it is possible to analyze a time series generated by Equation (12.2) with a computer nowadays, and find out in a few minutes all the relevant parameters in the determinism of the system [13]. However, the involved techniques are quite complicated; they seem to be limited to single extrema nonlinear functions, and they do not seem to be robust enough
0882-Perruquetti-ch12_R2_170805
12.6
Other Optical Set-Ups for Encryption
473
when analyzing the real experimental signal (they are usually tested with numerically generated chaos). These methods also do not seem to be applicable with more complicated architecture, as the ones already noticed in the previous section (higher order, several feedback loops, etc.).
12.6
Other Optical Set-Ups for Encryption
In contrast to quantum cryptography, chaos-based cryptography is not claim absolute security, but it is more attached to develop an alternate encryption scheme for high bandwidth telecommunication systems. Its hardware-based architecture allows real-time decoding procedure, without the need for any computation time as is the case for algorithm-based encryption. Since optical transmission systems are the ones with the widest bandwidth, many different systems are currently being developed for fiber telecommunication networks. The first demonstration in optics using the previously described wavelength chaos system was only able to encode voice data, but rapidly other systems were carried out, based on fiber laser or semiconductor laser or electro-optic modulator, and reaching a few hundreds of megabits per second [14, 15] and even the gigabits per second [16]. The following sections are devoted to the brief description of other set-ups that are still studied in the field of encryption using chaos for optical telecommunications.
12.6.1
Chaotic Laser Intensity Using Electro-Optic Devices
This set-up is mainly explored by our group at the optics Dept/ FEMTO-ST to demonstrate encryption speed higher than the gigabits per second in the frame of the OCCULT (optical chaos communication using laser transmitter) project, an European IST FET program. The basic principles are those of the wavelength chaos generator, in which the wavelength tunable followed by the optical spectral filter element is replaced by an ultrafast integrated electro-optic Mach–Zehnder modulator, a standard component in the present-day ultrafast optical telecommunication systems (bandwidth >10 GHz). The experimental setup is depicted in Figure 12.14. Following the description given in the general physical principles, the linear amplifying element to be identified consists of a fast photodiode, followed by an RF amplifier, an RF driver, and the electrodes of the integrated electro-optic modulator. The linear relationship is thus calculated between the input intensity detected by the photodiode and the refractive index change in the optical waveguides due to the electro-optic effect. Since the Mach–Zehnder
0882-Perruquetti-ch12_R2_170805
474
Chaos, Optical Systems, and Cryptography message EO integrated Mach-Zehnder
laser
diode
CW laser
diode 2 x 2 fiber coupler
RF driver K
output to the receiver amplified photodiode FIGURE 12.14 Electrooptic intensity chaos emitter.
is a two-wave interferometer, we find once again a sine square function as the nonlinear function, between the input refractive index modulation and the output intensity (the Mach–Zehnder being illuminated by a constant optical power, the CW laser diode). The message is inserted all-optically using a conventional 2 × 2 fiber coupler, thus leading to two outputs: one for the internal delayed feedback (the delay is performed by the fibered optical feedback length) and the other for the signal to be transmitted. The main characteristics of this set-up consist of the use of standard or nearly standard component of optical telecommunication, all of them being connected with fibers, thus improving the stability of the set-up. These components are commercially available, they can operate at very high bit rate, and in that sense, they seem to be very promising for ultrafast chaos encryption.
12.6.2
Chaotically Coherence Modulated Light Beam
This exotic set-up [17] uses components very similar to the previous one (see Figure 12.15), but it operates physically very differently, since it involves an unusual modulation technique in optics, called the coherence modulation. The main difference in this set-up concerns the use of a broad band optical source [super luminescent diode (SLD), instead of a laser] and an unbalanced electro-optic Mach–Zehnder. We refer the reader to the references for more information, since details regarding the coherence modulation would be out of the scope of this chapter.
0882-Perruquetti-ch12_R2_170805
12.6
Other Optical Set-Ups for Encryption t1
TRANSMITTER
T1 ~~~~ TD1
K1 Amp1
LPF1
message m(t)
475
+
PD1
SLD MZ1
MZ´1 TRANSMISSION
PD
MZ´2
MZ2 -
decoded message RECEIVER
PD2 LPF2 t2
Amp2 K2
TD2 T2 ~~~~
FIGURE 12.15 Emitter–receiver set-up using chaos in coherence modulation.
However, it has very attracting features [18], although it cannot use standard optical telecommunication components (the unbalanced EO Mach–Zehnder modulators). Owing to the coherence modulation properties it offers a second level of encryption, thus allowing a record masking efficiency down to −70 dB. The transmitted light does not indeed exhibit any intensity modulation, thus performing the second encryption level since a simple photodiode cannot extract any information. The message extraction can be performed all-optically, whereas all the schemes reported up to now require an electronic subtractor. Finally, the intrinsic properties allow the use of multiplexed encryption signals on the same fiber (this feature is similar to the one concerning the possibility of having multiple users in the CDMA modulation technique).
12.6.3 “All-Optical” External Cavity Laser Diode This set-up uses a well-known and intensively studied configuration in the semiconductor laser sciences: the external cavity laser diode (ECLD, see Figure 12.16). A laser diode is very sensitive to any optical feedback, even with a very small amount of re-injected light (down to −70 dB). The basic equations describing the dynamics are known for more than 20 years [19], but the numerous behaviors are so complex and so different that the system is still being studied. The dynamics is described by a set of three first-order coupled differential equations (the rate equations of the laser), ruling the amplitude and the phase of the electric field, and the density of
0882-Perruquetti-ch12_R2_170805
476
Chaos, Optical Systems, and Cryptography
DC in mirror laser
diode chaotic output light FIGURE 12.16 Basic ECLD set-up.
the inversion population producing the optical amplification in the semiconductor junction. The population equation is nonlinearly coupled to the field energy (through the gain saturation), thus resulting in a nonlinear filtering process. The delay term is introduced by the feedback field coming from the external cavity, but this delayed feedback is purely linear. The relevant parameters determining the actual dynamical regime are the feedback level, the pumping rate, and the length of the external cavity. The first numerical demonstration of the potential use of this configuration [20] for chaotic encryption was proposed in 1996. But the experimental demonstration of the possible synchronization between two such distant ECLDs using a unidirectional coupling appeared only a few years later [21]. This architecture is currently explored in the OCCULT project by five different teams in Europe. Its main advantage lies on a very fast dynamical process, with time scales as short as a few picoseconds (related to the carrier lifetime in the active junction and to the photon life time in the free running laser cavity), but it might suffer from an extreme experimental sensitivity.
12.6.4
Direct Optoelectronic Feedback in SC Lasers
Although it appears as the most simple configuration, it owns the record speed for chaos encrypted binary data, with 2.5 Gbits/sec [22]. The chaos generator is depicted in Figure 12.17. It involves both electronic and optoelectronic dynamical systems. It consists of a high-speed semiconductor laser diode whose injection current is driven from the direct, but delayed and eventually amplified, detection of the output optical power by a fast photodiode. The dynamical process once again involves the rate equations of a semiconductor laser, but the delayed term influences the rate of the population inversion (instead of the electric field) through the feedback
0882-Perruquetti-ch12_R2_170805
References
477 DC in
RF amplifier K
laser
photodiode
diode chaotic output light FIGURE 12.17 Direct optoelectronic feedback in an SC laser.
current, and its influence is nonlinearly converted by the feedback path (from the photodiode to the laser junction). The system has been shown to be very fast. The drawbacks concern the low dimension of the chaos produced (Lyapunov dimension <10 [23]) and a low flexibility of the set-up (low key-space dimension).
12.7
Conclusions
Although many samples have appeared in the last 10 years, chaos-based encryption systems have to be considered as still being under development, and important goals still need to be achieved to improve their efficiency in terms of noise sensitivity, decoding quality, robustness, and confidentiality. More specific efforts have to be taken regarding the modulation technique (i.e., the way used to mix the information into the chaotic waveform). Also, the actual and precise evaluation of the degree of confidentiality is currently being studied. Even if some of the proposed encryption schemes have been broken [24], the field is quite young and the evolution possibilities are enormous. Chaos cryptography is not necessarily a competitor for classical algorithm-based encryption techniques; in contrast, it might give ideas to develop new algorithms. It is, for example, well known that computer science already uses a random number generator algorithm based on chaotic dynamics; an even more relevant example is a recent encryption software commercialized in Japan, which is based on chaos theory, and which is claiming a 2048 bit encryption key.
0882-Perruquetti-ch12_R2_170805
478
Chaos, Optical Systems, and Cryptography
References 1. C. Mira, S. Gentil, R. Abraham, H. Kawakami, M. Hasler, C. Grebogi, L. Chua, Y. Kevrekidis, and Y. Maistrenko, Bifurcation, chaos, transformations non inversibles, applications, École d’Automatique d’Été de Grenoble, Laboratoire d’Automatique de Grenoble, France, September 1995. 2. K. Ikeda, Multiple-valued stationnary state and its instability of the transmitted light by a ring cavity system, Optics Comm., 30 (2), 1979. 3. J. Duvernoy, J.P. Goedgebuer, and H. Porte, Bistabilité, multistabilité et chaos en longueur d’onde, Ann. des Télécommun., 42 (5-6), 315, 1987. 4. L. Larger, J.-P. Goedgebuer, and J.M. Merolla, Chaotic oscillator in wavelength: a new set-up for investigating differential difference equations describing non linear dynamics , IEEE J. Quantum Electron., 34 (4), 594–601, 1998. 5. L.M. Pecora and T.L. Carroll, Synchronization in Chaotic Systems, Phys. Rev. Lett., 64 (8), 1990. 6. H. Dedieu, M.P. Kennedy, and M. Hasler, Chaos Shift Keying: modulation and demodulation of a chaotic carrier using self-synchronizing Chua’s circuits, IEEE Trans. Circuits Syst., 40 (2), 1993. 7. J.-P. Goedgebuer, L. Larger, and H. Porte, An optical cryptosystem based on replication of hyperchaos and wavelength-induced nonlinearities, Phys. Rev. Lett., 80 (10), 2249–2252, 1998. 8. L. Larger, J.-P. Goedgebuer, and F. Delorme, An optical encryption system using hyperchaos generated by an optoelectronic wavelength oscillator, Phys. Rev. E, 57 (6), 6618–6624, 1998. 9. S. Singh, Histoire des Codes Secrets, J.C. Lattès, 1999. 10. M.C. Mackey and L. Glass, Science, 197, 287, 1977. 11. R. Hegger, M.J. Bünner, and H. Kantz, Identifying and modeling delay feedback systems , Phys. Rev. Lett., 81 (3), 558–561, 1998. 12. C. Zhou and C.H. Lai, Extracting messages masked by chaotic signals of timedelay systems, Phys. Rev. E, 60 (1), 320–323, 1999. 13. V.S. Udaltsov, L. Larger, J.-P. Goedgebuer, J.-B. Cuenot, P. Levy, and W.T. Rhodes, Cracking chaos-based encryption systems ruled by nonlinear time delay differential equations, Phys. Lett. A, 308, 54–60, 2003. 14. G.D. VanWiggeren and R. Roy, Communicating with chaotic lasers, Science, 279 (3), 1198–1200, 1998. 15. J.-P. Goedgebuer, P. Levy, L. Larger, C.C. Chen, and W.T. Rhodes, High bandwidth chaotic encryption system, IEEE J. Quant. Electron. (Special Issue on Optical Chaotic Cryptography), 38 (9), 1178–1183, 2002. 16. J. Paul, S. Sivaprakasam, P.S. Spencer, P. Rees, and K.A. Shore, GHz bandwidth message transmission using chaotic diode lasers, Electron. Lett., 38 (1), 28–29, 2002. 17. L. Larger, M.W. Lee, J.-P. Goedgebuer, T. Erneux, and W. Elflein, Chaos in coherence modulation: bifurcations of an oscillator generating optical delay fluctuations, JOSA B, 18 (8), 1063–1068, 2001. 18. M.W. Lee, L. Larger, and J.-P. Goedgebuer, Encryption system using chaotic delays between lightwaves, IEEE J. Quantum Electron., 39 (7), 931–935, 2003.
0882-Perruquetti-ch12_R2_170805
References
479
19. R. Lang and K. Kobayashi, External optical feedback effects on semiconductor injection laser properties, IEEE J. Quantum Electron., 16 (3), 347–354, 1980. 20. C.R. Mirasso, P. Colet, and P. Garcia-Fernadez, Synchronization of chaotic semiconductor lasers: application to encoded communications, IEEE Photon. Tech. Lett., 8 (2), 299–301, 1996. 21. I. Fischer, Y. Liu, and P.D. Peter, Synchronization of chaotic semiconductor laser dynamics on subnanosecond time scales and its potential for chaos communication, Phys. Rev. A, 62 (1), 011801, 2000. 22. S. Tang and J.M. Liu, Message encoding–decoding at 2.5 Gb/s through synchronization of chaotic pulsing semiconductor lasers, Optics Lett., 26 (23), 1843–1845, 2001. 23. H.D.I. Abarbanel, M.B. Kennel, L. Illing, S. Tang, H.F. Chen, and J.M. Liu, Synchronization and Communication Using Semiconductor Lasers With Optoelectronic Feedback, IEEE J. Quantum Electron., 37 (10), 1301–1311, 2001. 24. J.B. Geddes, K.M. Short, and K. Black, Extraction of signals from chaotic laser data, Phys. Rev. Lett., 83 (25), 5389–5392, 1999.
0882-Perruquetti-ch12_R2_170805
0882-Perruquetti-ch13_R2_290705
13 Indirect Field-Oriented Control of Induction Motors: A Hopf Bifurcation Analysis
Francisco Gordillo, Francisco Salas, Romeo Ortega, and Javier Aracil
CONTENTS 13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.2 The Hopf Bifurcation and the Emergence of Oscillations 13.3 Detection of Hopf Bifurcations in Induction Motors with Indirect FOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.3.1 Zero Load Torque Case . . . . . . . . . . . . . . . . . . . . 13.3.2 Nonzero Load Torque Case . . . . . . . . . . . . . . . . . 13.4 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.5 Approximate Study of Limit Cycles Using the Harmonic Balance Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.5.1 Zero Load Torque Case (τ L = 0) . . . . . . . . . . . . . 13.5.2 Nonzero Load Torque Case (τ L = 0) . . . . . . . . . . 13.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix: Motor Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13.1
. . . . . 481 . . . . . 483 . . . .
. . . .
. . . .
. . . .
. . . .
485 486 488 491
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
493 495 496 497 497 501
Introduction
Field-oriented control (FOC) is the standard for high dynamic performance induction motor drives due to its high reliability. Historically, this remarkable controller was derived as a result of physical intuition and a deep understanding of the machine operation, with little concern about a rigorous analytical study of its stability and performance. An approximate 481
0882-Perruquetti-ch13_R2_290705
482
Indirect Field-Oriented Control of Induction Motors
analysis (based on steady-state behavior, time-scale assumptions, and linearizations [1–3]) can be combined with the designer expertise to commission the controller in simple applications. However, to meet large bandwidth requirements, or other tight specifications, this ad hoc commissioning stage may be time-consuming and expensive. To simplify the off-line tuning of FOC, and eventually come to terms with its achievable performance, a better theoretical understanding of the dynamic behavior of FOC is essential. Such an analysis is unfortunately stymied by the fact that the dynamic behavior of the closed loop is described by complex nonlinear relationships. Realizing the practical importance of FOC, and motivated by the need to clarify its theoretical underpinnings, a series of studies have been carried out in the last few years on indirect FOC for current-fed induction machines. The outcome of this research is summarized in Ref. [4]. In this chapter, we continue with this line of research and concentrate on the practically important problem of oscillation quenching through suitable tuning of the gains of the PI velocity loop. The appearance of self-sustained oscillations in high-performance AC drives, and particularly in FOC of induction motors, is a well-documented, but little understood phenomenon. It is well known that the oscillations may be quenched by retuning the outer-loop PI speed control, but no precise rules to carry out this task are known. This tuning procedure is particularly difficult due to the high uncertainty on the rotor time-constant. In this chapter, we apply some standard techniques of dynamical systems (in particular, harmonic balance and bifurcation analysis) to show that these oscillations may arise due to the existence of Hopf bifurcations. As a result of our analysis, we obtain some simple rules to quench the oscillations via a suitable PI tuning. The present study was motivated by Ref. [5] where the robustness results of FOC reported in Ref. [6] are generalized. In particular, in Ref. [5], an explicit construction of a Lyapunov function, which allows for the evaluation of stability margins, is given. Furthermore, the authors also study the existence of a saddle–node bifurcation. Our study is complementary to the latter as we are interested here in Hopf bifurcations, which as our study conclusively proves, are at the core of the oscillation phenomena often observed in practice [2]. Reference [7] deals with the same problem but with a different and complementary approach. This chapter is organized as follows: in Section 13.2, we briefly review the theory of Hopf bifurcations. In Section 13.3, the bifurcation is detected with standard tangent approximation analysis. Simulations that corroborate the theoretical predictions are given in Section 13.4. Section 13.5 is devoted to a complementary analysis of bifurcation detection via harmonic balance. We end the chapter with Section 13.6, which contains some concluding remarks. The derivation of the system equations is given in the Appendix.
0882-Perruquetti-ch13_R2_290705
13.2
The Hopf Bifurcation and the Emergence of Oscillations
13.2
The Hopf Bifurcation and the Emergence of Oscillations
483
Bifurcation analysis in control systems is a growing field [8–11]. This is mainly due to the realization of the richness and variety of behaviors which a nonlinear system can display [12]. These behaviors include selfsustained oscillations, which are out of the scope of the realm of linear systems [13, 14]. The most frequent bifurcation associated with the appearance of oscillations is the Hopf bifurcation, which will be recalled later in this section. The analysis of a control system has been mainly concerned with the analysis of the system around the operating point. This point is the desired attractor of the closed loop system. The stability of the corresponding equilibrium point can be analyzed by linearizing the system around that point. The eigenvalues of the linearized system define the stability of the system. The stability is lost when the real part of one or more of the eigenvalues becomes positive. Generically, this loss of stability is reached when one real eigenvalue becomes positive or when two complex eigenvalues cross the imaginary axis. In this last case, the phenomenon known as Hopf bifurcation is produced. Suppose that the dynamical system x˙ = f (x, µ) with x ∈ Rn and µ ∈ R has an equilibrium point at x0 , for some µ = µ0 ; that is, f (x0 , µ0 ) = 0. Let A(µ) = Dx f (x0 (µ), µ) be the Jacobian matrix of the system at the equilibrium point. Assume that A(µ0 ) has a single pair of purely imaginary eigenvalues λ(µ0 ) = ±jω, and no other eigenvalue with zero real part; and furthermore, d(λ(µ))/dµ|µ=µ0 = 0. The last condition is known as the transversality hypothesis. In the complex plane, the transversality hypothesis can be easily checked by the well-known root locus of the closed loop system (Figure 13.1). Under these conditions, the Hopf bifurcation theorem states that a limit cycle is born at (x0 , µ0 ) [15]. The parameter µ is known as the bifurcation parameter. Actually, there is a third condition for the existence of Hopf bifurcations, but this is a technical hypothesis in order to avoid nongeneric, degenerate cases such as the linear one [14]. The Hopf bifurcation can be visualized as shown in Figure 13.2. As the Hopf bifurcation is produced, the operating point loses the stability, and a stable limit cycle appears around it. This is known as the supercritical Hopf bifurcation. There is also a subcritical one, where an unstable limit cycle dies at the bifurcation point. The Hopf bifurcation that will be detected in the sequel in the induction motor is of the supercritical type, that is, the stable limit cycle surrounds the unstable equilibrium state.
0882-Perruquetti-ch13_R2_290705
484
Indirect Field-Oriented Control of Induction Motors Im
X
Re
X
FIGURE 13.1 Transversality condition for a Hopf bifurcation.
X2
µ0 µ
X1
FIGURE 13.2 Supercritical Hopf bifurcation.
One procedure for detecting Hopf bifurcations is the following: 1. Look for the equilibrium points of the system solving the equation f (x, µ) = 0. The equilibria x0 will depend on µ; that is x0 = x0 (µ). 2. For each equilibrium point: (a) Obtain the value of the Jacobian matrix of the system at the equilibrium point.
0882-Perruquetti-ch13_R2_290705
13.3
Detection of Hopf Bifurcations in Induction Motors
485
(b) Look for the values of the bifurcation parameter µ which cause the Jacobian to have two eigenvalues in the imaginary axis. This condition can be formulated for any dimension n in the following way [16]: Hn−1 (µ) = 0
(13.1)
Hn−2 (µ) > 0, Hn−3 > 0, . . . , H1 (µ), p0 (µ) > 0
(13.2)
where Hi stands for the i principal minor of the Hurwitz matrix of the characteristic polynomial of the Jacobian matrix and p0 is the zero-order term of this polynomial. If a Hopf bifurcation ocurrs, then there will exist values of µ which fulfill Equation (13.1) and Equation (13.2). This condition is necessary but not sufficient. In order to ensure the emergence of a limit cycle, the eigenvalues must cross the imaginary axis when varying the bifurcation parameter µ (transversality condition, see Figure 13.1). This condition can be checked by plotting the root locus of the linearized system with µ as a parameter. It should be noted that the bifurcations give the conditions for the loss of stability. But bifurcations not only indicate that the stability is lost, but also how this loss of stability is produced. In the case of the supercritical Hopf bifurcation, the emergence of a stable limit cycle is associated with the loss of stability, and the system oscillates. Therefore, in looking for bifurcations, more information about the dynamical phenomena to be expected at the boundaries of the stability region is obtained. The conditions for the emergence of a Hopf bifurcation only predict when an oscillation appears. In the general case, the study of that oscillation is a very difficult task, but an approximation to it can be reached by means of the harmonic balance method [17, 18]. For a mathematical analysis of the validity of the harmonic balance approximation, see Refs. [19, 20].
13.3
Detection of Hopf Bifurcations in Induction Motors with Indirect FOC
In this section, the aforementioned procedure is applied to detect Hopf bifurcations in a current driven induction motor with indirect FOC. The
0882-Perruquetti-ch13_R2_290705
486
Indirect Field-Oriented Control of Induction Motors
equations of the system, which are developed in the Appendix, are x˙ 1 = −c1 x1 +
κc1
x˙ 2 = −c1 x2 −
κc1
u02 u02
x2 x4 + c2 u02
(13.3)
x1 x4 + c2 x4
(13.4)
x˙ 3 = −c4 [c5 (x1 x4 − x2 u02 ) − τL
(13.5)
x˙ 4 = ki x3 − kp c4 [c5 (x1 x4 − x2 u02 ) − τL ]
(13.6)
The notation is explained in the Appendix. Assuming that the rotor inductance is known, the parameter κ is equal to the ratio between the estimated and the true values of the rotor resistance, that is, κ = Rˆ r /Rr . The rotor resistance is really unknown due to the fact that it changes with time. Therefore, κ has been chosen as the bifurcation parameter. Notice that only positive values of κ are of physical interest. The analysis in this paper is directed towards the causes of the loss of stability. Thus, the desired equilibrium point is assumed to be locally stable in the case of exact estimation of the rotor resistance κ = 1. The aim of the study is to find the range of values for κ, around κ = 1, for which the equilibrium preserves its stability, by looking for the emergence of bifurcations. It must be pointed out that other complex phenomena due to the emergence of more bifurcations may occur beyond that range but these phenomena are not the subject of this paper. Two cases will be examined here: the case when there is no load torque (τL = 0) and the general case with τL = 0.
13.3.1
Zero Load Torque Case
When τL = 0, the analysis is simpler because in this case the system has only one equilibrium point which is independent of the rest of parameters [6]. Indeed, the equilibrium is x0 = (x10 , x20 , x30 , x40 ) = ( cc21 u02 , 0, 0, 0) and can be obtained by equating the time derivatives of xi to zero in system (13.3) to system (13.6) and solving the resulting system of equations. The Jacobian matrix of system (13.3) to system (13.6) at the equilibrium point has the expression
−c1 0 0 A(x ) = 0 0
0 −c1
0
0
0
c2 − κc2
c4 c5 u02
0
kp c4 c5 u02
ki
u02 c4 c5 c2 c1 u02 kp c4 c5 c2 − c1 −
(13.7)
0882-Perruquetti-ch13_R2_290705
13.3
Detection of Hopf Bifurcations in Induction Motors
487
Looking at the first row of the Jacobian matrix, it is obvious that det(c1 I − A(x0 )) = 0. Therefore, −c1 is an eigenvalue of A(x0 ) and, then, its characteristic polynomial must be divisible by λ + c1 . Indeed det(λI − A(x0 )) = (λ + c1 )(λ3 + α2 λ2 + α1 λ + α0 ) with α2 =
c12 + u02 kp c4 c5 c2 c1
(13.8)
α1 =
u02 kp c4 c5 c1 κc2 + c4 c5 ki c2 u02 c1
(13.9)
α0 = u02 c4 c5 ki κc2
(13.10)
Condition (13.1) and Condition (13.2) for the particular case of n = 3 can be written as α0 = α2 α1
(13.11)
α1 > 0
(13.12)
α0 > 0
(13.13)
Since all the parameters in Equation (13.9) and Equation (13.10) are positive, Equation (13.12) and Equation (13.13) hold. Equation (13.11) leads to
c12 + u02 kp c4 c5 c2
u02 kp c4 c5 c1 κc2 + c4 c5 ki c2 u02
c12 which yields
= u02 c4 c5 ki κc2
κ=−
c12 + u02 kp c4 c5 c2 ki
c1 (kp c12 + u02 kp2 c4 c5 c2 − c1 ki )
(13.14)
This expression is of great practical interest. It has been assumed that the desired equilibrium is stable for κ = 1. In that case, no limit cycles will appear in the neighborhood of this point provided that this equilibrium does not suffer a Hopf bifurcation. Expression (13.14) gives the value of κ = Rˆ r /Rr corresponding to a Hopf bifurcation in the case of τL = 0. In other words, Equation (13.14) gives an upper limit on the error of the estimation of Rr when τL = 0 in order to prevent the existence of limit cycles. In Ref. [6], the authors prove that for κ < 3, there is only one equilibrium point,
0882-Perruquetti-ch13_R2_290705
488
Indirect Field-Oriented Control of Induction Motors 5 4 3 2 1 0 0.1 0.2 0.3 0.4 0.5
Kp
1 2 3
Ki
4
FIGURE 13.3 Representation of Equation (13.14) for c1 = 4, c2 = 4, c4 = 1, c5 = 1, and u02 = 1.
and necessary and sufficient conditions are given to assure the stability of this equilibrium. Here, we look at the cause of the loss of stability: the emergence of a limit cycle by a Hopf bifurcation. In Figure 13.3, the values of κ given by Equation (13.14) are plotted against kp and ki for c1 = 4, c2 = 4, c4 = 1, c5 = 1, and u02 = 1. For each pair of values of kp and ki , the system will not present limit cycles provided that κ is below the curve. As can be seen from Equation (13.14), the curve corresponding to the aforementioned values goes to infinity for ki = kp2 + 4kp . For ki < kp2 + 4kp , the critical value of κ is less than zero and has no practical meaning. A practical conclusion from Equation (13.14) and Figure 13.3 is that increasing kp allows for larger values of the critical κ (larger admissible estimation errors), and increasing ki yields the opposite effect.
13.3.2
Nonzero Load Torque Case
The case with τL = 0 is more involved and a single expression similar to Equation (13.14) is difficult to obtain. The reason is that, for this case, the equilibrium point is obtained by solving a third-order polynomial equation [6]. Substitution of the value of the equilibrium in the Jacobian matrix leads to complex expressions. Nevertheless, for this case conclusions can be drawn for concrete values of the parameters. In fact, for particular values of
0882-Perruquetti-ch13_R2_290705
13.3
Detection of Hopf Bifurcations in Induction Motors
489
c1 , c2 , c4 , c5 , u02 , kp , ki , and τL , the critical value of κ may be obtained following the same procedure as mentioned earlier. For example, making c1 = 4, c2 = 4, c4 = 1, c5 = 1, u02 = 1, kp = 0.1, ki = 1, and τL = 0.3, the eigenvalues of the Jacobian matrix at the corresponding equilibrium point can be computed for each value of κ, giving the root locus of Figure 13.4 (in this figure, only two branches are plotted because the other two branches are far away to the left). It can be seen in this figure that the condition of transversality is fulfilled, and a Hopf bifurcation is expected to be produced. Figure 13.5 shows the values of the critical κ for several values of τL , and kp (the rest of parameters have the same values as shown). The most critical value of κ corresponding to the Hopf bifurcation will be that which is closest to one since it has been assumed that the desired equilibrium is stable for κ = 1. As can be seen in Figure 13.5, this case corresponds to τL = 0. If this fact were general, it would give more practical value to Equation (13.14), but is difficult to be proven for the general case. Nevertheless, it seems to be true in accordance with all the cases tested. Figure 13.5 also shows that as τL increases so does the value of κ corresponding to a Hopf bifurcation. It could be thought that, for high values
2 Imag
1
–0.4
–0.2
0
0.2
0.4
–1
–2 FIGURE 13.4 Root locus for c1 = 4, c2 = 4, c4 = 1, c5 = 1, u02 = 1, kp = 0.1, ki = 1 and τL = 0.3.
Real
0882-Perruquetti-ch13_R2_290705
490
Indirect Field-Oriented Control of Induction Motors 12
10 kp = 0.2 8
κ
kp = 0.175 6 kp = 0.15 4
kp = 0.1
2
0
0
0.05
0.1
0.15
0.2
0.25 τL
0.3
0.35
0.4
0.45
0.5
FIGURE 13.5 Values of κ corresponding to a Hopf bifurcation vs. τL .
of τL , the estimation error would not affect the stability of the system. Nevertheless, this stability is lost in another bifurcation, a saddle-node bifurcation, due to the emergence of two new equilibria, as has been reported in Ref. [5, 6]. The upper curve in Figure 13.5 represents the values of κ corresponding to this bifurcation. It must be pointed out that the Hopf bifurcation exists above the curve of the saddle–node bifurcation but it has not been plotted because it has no practical meaning because the local stability of the equilibrium has already been lost at this point. Furthermore, Figure 13.5 does not represent the full bifurcation diagram of the system, but only the curves associated with both bifurcations. Specifically, around the intersection of the two kind of curves in Figure 13.5 more complicated bifurcations will probably exist. The Hopf bifurcation studied in this paper is of a more generic character that the possible bifurcations associated with the intersection of those curves. The practical application of this graph is the following: for a given set of parameters, the graph can be constructed. The admissible values of κ (so the equilibrium point is stable) as a function of τL are under two curves: the one corresponding to the given value of kp and the one corresponding to the saddle-node bifurcation. Parameter κ must be less than the minimum of these curves (for admissible τL ). In all the situations, we
0882-Perruquetti-ch13_R2_290705
13.4
Simulations
491
have tested this minimum corresponds to τL = 0 if excessively large values of τL are not considered. The value of the critical κ for τL = 0 is given by Equation (13.14). Curiously, there are situations where very large estimation errors may be admissible: for small values of the load torque (τL → 0) and when kp and ki are such that Equation (13.14) yields negative values. In this case, the saddle-node bifurcation is not possible (the upper curve of Figure 13.5 goes to infinity as τL → 0) and the Hopf bifurcation would occur for κ < 0, which has no practical meaning.
13.4
Simulations
To corroborate the aforementioned results, the system has been simulated with the value of the parameters given in Section 3.2 (including ki = 1) but with different values for kp , τL , and κ which are shown in Table 13.1. It can be seen from Table 13.1 that simulations A and B correspond to the case of τL = 0. Introducing the values of the parameters in Equation (13.14), this gives κ = 1.73 as the limit for the emergence of a limit cycle. Therefore, simulation A must correspond to a stable behavior and simulation B must present a limit cycle. On the other hand, simulations C and D correspond to τL = 0.2 = 0 and Equation (13.14) is not applicable but Figure 13.5 is. In this case, the bifurcation point is κ = 3.83 and simulation C must not present limit cycles while simulation D must. In performing all these simulations, the predicted behaviors are corroborated as it is shown in Figure 13.6. In this figure, two graphs are plotted for each simulation. In the first one, the evolution of the amplitudes of the oscillations can be observed. It can be seen that the amplitudes of simulations A and C go to zero whereas in simulations B and D, the oscillations tend to a limit cycle. The oscillations can be better observed in the second zoom graph of each simulation. TABLE 13.1 Values for kp , τL , and κ Corresponding to the Four Simulations Simulation A B C D
kp
τL
κ
0.1 0.1 0.15 0.15
0 0 0.2 0.2
1.65 1.8 3.7 3.9
Predicted Behavior Stable Limit cycle Stable Limit cycle
0882-Perruquetti-ch13_R2_290705
492
Indirect Field-Oriented Control of Induction Motors 0.03
1 0.8
0.02
0.6 0.4
0.01
X3
X3
0.2 0
0
−0.2 −0.01
−0.4 −0.6
−0.02
–0.8 −1
0
100 200 300 400 500 600 700 800 900 100 Time (secs.)
−0.03 400 405 410 415 420 425 430 435 440 445 450 Time (secs.)
Simulation A
1
0.25
0.8
0.2
0.6
0.15 0.1
0.2
0.05
0
X3
X3
0.4
−0.2
0
−0.05
−0.4
−0.1
−0.6
−0.15
−0.8 −1
−0.2 −0.25 0 100 200 300 400 500 600 700 800 900 1000 400 405 410 415 420 425 430 435 440 445 450 Time (secs.) Time (secs.)
Simulation B 0.025
0.8
0.02
0.6
0.015
0.4
0.01
0.2
0.005
X3
X3
1
0
0
−0.005
−0.2 −0.4
−0.01
−0.6
−0.015 −0.02
−0.8 −1
0 100 200 300 400 500 600 700 800 900 1000 Time (secs.)
−0.025 400 405 410 415 420 425 430 435 440 445 450 Time (secs.) 0.1
0.8
0.08
0.6
0.06
0.4
0.04
0.2
0.02
X3
X3
Simulation C 1
0
0
−0.2
−0.02
−0.4
−0.04
−0.6
−0.06
−0.8
−0.08
−1
0
100 200 300 400 500 600 700 800 900 1000 Time (secs.)
−0.1 400 405 410 415 420 425 430 435 440 445 450 Time (secs.)
Simulation D
FIGURE 13.6 Evolution of x3 in the four simulations.
0882-Perruquetti-ch13_R2_290705
13.5
Approximate Study of Limit Cycles
13.5
Approximate Study of Limit Cycles Using the Harmonic Balance Method
493
Although, as stated in previous sections, the Hopf bifurcation is of a local nature, in this section, we will apply a method that is not restricted to the bifurcation point, but has a more global nature. This method, called harmonic balance, not only allows us to detect limit cycles at their birth, as in local methods, but also to evaluate an approximation to their frequency and amplitude [20]. The harmonic balance method is based on the Fourier series for periodic functions. Consider a scalar function y(t), which is periodic with period T. It can be represented by its Fourier series in the form y(t) = c0 +
∞
{ak cos(kωt) + bk sin(kωt)}
(13.15)
k=1
where ω is the angular frequency and has the value ω = 2π /T, and c0 is the bias coefficient. The Bessel inequality [21] states that ak , bk → 0 as k → ∞, justifying the approximation of y(t) by truncating the Fourier series after a finite number of terms, y(t) = c0 +
n
{ak cos(kωt) + bk sin(kωt)}
(13.16)
k=1
The simplest approximation would be to take n = 1, resulting in the first-harmonic balance method. In this case, every dynamical variable is approximated by a single sinusoidal oscillation plus a bias constant. This balance is equivalent to the dual describing function method [22] but, here, the harmonic balance is applied directly. To apply the method to the fourth-order system (13.3)–(13.6), we assume that each state variable xi has a self-sustained oscillation of the same frequency ω; that is x1 = a10 + a11 cos ωt
(13.17)
x2 = a20 + a21 cos ωt + a22 sin ωt
(13.18)
x3 = a30 + a31 cos ωt + a32 sin ωt
(13.19)
x4 = a40 + a41 cos ωt + a42 sin ωt
(13.20)
where the coefficients ai0 , (i = 1, . . . , 4) are the bias components and ai1 , ai2 are the terms a1 and b1 in Equation (13.16). Notice that the amplitude
0882-Perruquetti-ch13_R2_290705
494
Indirect Field-Oriented Control of Induction Motors
coefficient of the sine term a12 in Equation (13.17) is null since the time origin can be defined arbitrarily. The rest of the sine and cosine coefficients are not null because a phase shift between the oscillations of the state variables is considered. As stated previously, this is an approximate method because a truncated Fourier series is used (in this case, we only use the first harmonic n = 1), but the method can be made as exact as desired, using more terms of the Fourier series in Equation (13.17) to Equation (13.20) [15, 19, 23]. In this case, the method would be more involved. By substituting Equation (13.17) to Equation (13.20) and its derivatives into Equation (13.3) to Equation (13.6), grouping bias, sine, and cosine terms, and ignoring harmonics higher than one, a nonlinear system of 12 equations with 12 unknown variables, which are aij and ω, can be obtained. The system of equations is
0 = −c1 a10 + −a11 ω =
κc1 u02
κc1
1 1 a20 a40 + a21 a41 + a22 a42 + c2 u02 (13.21) 2 2
u02
(a20 a42 + a22 a40 )
0 = −c1 a11 +
κc1
0 = −c1 a20 −
κc1
−a21 ω = −c1 a22 −
κc1
a22 ω = −c1 a21 −
κc1
u02 u02 u02 u02
(a20 a41 + a21 a40 ) 1 a10 a40 + a11 a41 + c2 a40 2
(13.22) (13.23)
(13.24)
a10 a42 + c2 a42
(13.25)
(a10 a41 + a11 a40 ) + c2 a41
(13.26)
1 0 0 = −c4 c5 a10 a40 + a11 a41 − u2 a20 + c4 τL 2
−a31 ω = −c4 c5 a10 a42 − u02 a22
a32 ω = −c4 c5 a10 a41 + a11 a40 − u02 a21
1 0 = ki a30 − kp c4 c5 a10 a40 + a11 a41 − u02 a20 + kp c4 τL 2
−a41 ω = ki a32 − kp c4 c5 a10 a42 − u02 a22
a42 ω = ki a31 − kp c4 c5 a10 a41 + a11 a40 − u02 a21
(13.27) (13.28) (13.29) (13.30) (13.31) (13.32)
0882-Perruquetti-ch13_R2_290705
13.5
Approximate Study of Limit Cycles
495
where Equation (13.21) to Equation (13.23) correspond to Equation (13.3); (13.24)–(13.26) to (13.4); (13.27)–(13.29) to (13.5); and (13.30)–(13.32) to (13.6). The solutions to system (13.21) to system (13.32) for ai1 = 0, and ai2 = 0 (i = 1, . . . , 4) will be the equilibrium points, and those with any aij = 0, with j = 0 are periodic solutions. These periodic solutions will give an approximation to the frequency and amplitude of the self-sustained oscillations of the state variables. There will be several solutions, real and imaginary, but only the real ones are of interest and thus will be retained. The study is again divided into two cases: the case τL = 0 and the general case τL = 0. 13.5.1
Zero Load Torque Case (τ L = 0)
As stated in Section 13.3, when τL = 0, the analysis is simpler than in the case τL = 0, because in this case the system has only one equilibrium point, which is independent of the rest of the parameters. An analytical solution of system (13.21) to system (13.32) is too complex to be given as a function of parameters (c1 , c2 , c4 , c5 , u02 ), but for particular values of these parameters, a set of solutions can be given for any κ, kp , ki . Using the values of the parameters given in Table 13.1 the solutions to system (13.21) to system (13.32) can be obtained numerically: Solution 1: (a10 = 1, a11 = 0, a20 = 0, a21 = 0, a22 = 0, a30 = 0, a31 = 0, a32 = 0, a40 = 0, a41 = 0, a42 = 0) for any ω. This solution is the desired equilibrium point. • Solution 2: •
a10 =
4kp + α 2 a11 = 0 4kp + 4κkp + ki
4βkp (α 2 + κα 2 − ki ) kp αβ(4kp + α 2 ) a22 = − ki (4kp + 4κkp + ki ) ki (4kp + 4κkp + ki ) αβ =0 a32 = − ki ap αβ =β a42 = − ki
a20 = 0
a21 = −
a30 = 0
a31
a40 = 0
a41
ω=α
where α and β are the solutions to the equations
(13.33) kp α 4 + 4kp2 + 16kp + 16κkp − 4κki α 2 + 4ki2 = 0
8κki kp + 32κkp2 + 32κ 2 kp2 β 2 + 64κ 2 kp2 − 4κki2 + 4kp2 ki + 4ki + α 2 kp ki + 4α 2 κkp2 − 16κ 2 kp ki + 16kp ki + 16κkp ki + 16κkp3 + 64κkp2 = 0 (13.34)
0882-Perruquetti-ch13_R2_290705
496
Indirect Field-Oriented Control of Induction Motors Solution 2 is the periodic one, and the conditions that make α and β real, obtained from Equation (13.33) and Equation (13.34), are the conditions for the existence of a limit cycle. From this general solution, it is concluded that x1 (the quadrature rotor flux) does not oscillate, and the others state variables oscillate around its value at the equilibrium point (zero), since the bias components are null (a20 = 0, a30 = 0, and a40 = 0).
By substituting the values of κ, kp , ki given in Table 13.1 to verify the presence of a limit cycle, we obtain the solutions: 1. For κ = 1.6, kp = 0.1, and ki = 1, we obtain only the equilibrium solution 2. But for κ = 1.8, kp = 0.1, and ki = 1, we obtain two solutions: (a) (a10 = 1, a11 = 0, a20 = 0, a21 = 0, a22 = 0, a30 = 0, a31 = 0, a32 = 0, a40 = 0, a41 = 0, a42 ) for any ω. This solution corresponds to the equilibrium point (b) (a10 = 0.937, a11 = 0, a20 = 0, a21 = 0.2157, a22 = 0.0391, a30 = 0, a31 = 0, a32 = 0.4183, a40 = 0, a41 = −0.3321, a42 = 0.0418, ω = 1.2595) If these solutions are now compared with the simulations presented in Section 13.4, it can be stated that the frequency of the limit cycle predicted earlier (ω = 1.2595 rad/sec) is very similar to the one of simulation B of Figure 13.6 (ω = 1.3 rad/sec). On the other hand, if the evolution of x1 in simulation A were plotted, it could be seen that x1 does not oscillate as is predicted in this study. The predicted amplitudes of the limit cycles are not exactly the ones obtained in the simulations because of the approximate nature of the method. These differences would be smaller if more harmonics were used, but that would make the problem computationally more involved [24]. From a qualitative point of view, the first-harmonic balance method captures the essence of the phenomenon. 13.5.2
Nonzero Load Torque Case (τ L = 0)
This case is more complex because there can be several equilibria, and numerical methods have been used to give a solution to the system of Equation (13.21) to Equation (13.32) for the parameter values given in Table 13.1. 1. For the values of parameters (c1 = 4, c2 = 4, c4 = 1, c5 = 1, u02 = 1, κ = 3.7, kp = 0.15, ki = 1, and τL = 0.2), only one solution can be obtained which corresponds to the equilibrium point: (a10 = 0.9657, a11 = 0, a20 = −0.1455, a21 = 0, a22 = 0, a30 = 0, a31 = 0, a32 = 0, a40 = 0.0562, a41 = 0, and a42 = 0) for any ω.
0882-Perruquetti-ch13_R2_290705
13.6
Conclusions
497
2. For the values (c1 = 4, c2 = 4, c4 = 1, c5 = 1, u02 = 1, κ = 3.9, kp = 0.15, ki = 1, τL = 0.2), there must be a limit cycle in the state variables (Section 13.3), and, indeed, there are two solutions to the system of Equation (13.21) to Equation (13.32): (a) (a10 = 0.9691, a11 = 0, a20 = −0.1483, a21 = 0, a22 = 0, a30 = 0, a31 = 0, a32 = 0, a40 = 0.0534, a41 = 0, and a42 = 0) for any ω. This solution is the equilibrium point. (b) (a10 = 0.8867, a11 = 0.1428, a20 = −0.1576, a21 = 0.2833, a22 = −0.0750, a30 = 0, a31 = 0.067, a32 = 0.1806, a40 = 0.0545, a41 = −0.0833, a42 = 0.0617, and ω = 1.9348). This solution corresponds to the limit cycle of simulation D in Figure 13.6 (in the simulation ω = 1.8 rad/sec). Note that in the case τL = 0, all the state variables oscillate.
13.6
Conclusions
In this chapter, we have shown that self-sustained oscillations in indirect FOC for induction motors may be due to the appearance of a Hopf bifurcation. Other causes of oscillations may exist but, for these cases, the local stability of the desired equilibrium point would be preserved. Therefore, the Hopf bifurcation is the most interesting phenomenon regarding oscillations from the practical point of view. We have given some simple rules tuning the PI gains of in order to prevent Hopf bifurcation and quench these oscillations. Our theoretical results were validated with some simulation evidence. Current research is under way to test our theoretical predictions in an experimental facility.
Appendix: Motor Model The dynamic model of a current driven induction motor expressing the rotor flux and the stator currents in a reference frame rotating at rotor speed is given by (see Ref. [4] for a detailed derivation of this model and the explanation of FOC): Lm Rr 1 ˙ i ψrq − γ isq + usq sq = 2 σ σ Lr Lm Rr 1 ˙ i ψrd − γ isd + usd sd = σ σ L2r
(13.35) (13.36)
0882-Perruquetti-ch13_R2_290705
498
Indirect Field-Oriented Control of Induction Motors Rr R r Lm ψrq + isq Lr Lr Rr R r Lm ψ˙ rd = − ψrd + isd Lr Lr 1 ω˙ = (−Bω(τ − τL )) J ψ˙ rq = −
θ˙ = ω τ=
(13.37) (13.38) (13.39) (13.40)
np Lm (ψrq isd − ψrd isq ) Lr
(13.41)
where σ = Ls − L2m /Lr , γ = (L2m Rr + L2r Rs )/σ L2m , and Lm Ls Lr Rs Rr is = [isq , isd ]T ψr = [ψrq , ψrd ]T us = [usq , usd ]T θ ω τ τL np J B q d
mutual inductance stator inductance rotor inductance stator resistance rotor resistance stator currents rotor flux stator voltage rotor position mechanical speed electromagnetic torque load torque pole pair number moment of inertia friction coefficient quadrature axis direct axis
In current-fed motors, high-gain fast-analog current loops are used, that is
1 d isq − isq ε
1 d isd − isd = ε
usq =
(13.42)
usd
(13.43)
d , id ) denoting the desired values for the stator currents, and ε with (isq sd a small positive number. Under these conditions, it is reasonable then to assume that the motor dynamics is described by the reduced model
0882-Perruquetti-ch13_R2_290705
13.6
Conclusions
499
obtained by setting ε = 0, that is ψ˙ r = −
Rr R r Lm ψr + is Lr Lr
(13.44)
J ω˙ = −Bω + (τ − τL)
(13.45)
θ˙ = ω
(13.46)
np Lm T i Jψr Lr s
τ= where
J=
−1 0
0 1
(13.47)
Now let us introduce the change of coordinates x = e−Jρd ψr
(13.48)
v = e−Jρd is
(13.49)
to express the rotor flux and the stator currents in a rotating reference frame, where the rotation matrix is −Jρd
e
=
cos ρd − sin ρd
sin ρd cos ρd
(13.50)
and ρd can be interpreted as the angle of the desired rotor flux, and ρ˙d as the slip frequency. Applying the change of coordinate (13.48) and coordinate (13.49) into Equation (13.44) gives x˙ = −
1 Lm x+ v − Jρ˙d x Tr Tr
(13.51)
where the rotor flux time constant Tr = Lr /Rr . Equation (13.45) becomes ω˙ =
1 (Bω + (τ − τL )) J
(13.52)
τ=
np Lm T v Jx Lr
(13.53)
0882-Perruquetti-ch13_R2_290705
500
Indirect Field-Oriented Control of Induction Motors
Defining u1 = ρ˙d , u2 = v1 , and u3 = v2 , these equations can be written as x˙ 1 = −c1 x1 + u1 x2 + c2 u2
(13.54)
x˙ 2 = −c1 x2 − u1 x1 + c2 u3
(13.55)
ω˙ = −c3 ω + c4 [c5 (u3 x1 − u2 x2 ) − τL ]
(13.56)
where c1 =
1 Tr
c2 =
Lm Tr
c3 =
B J
c4 =
1 J
c5 =
np Lm Lr
In this chapter, c3 is disregarded because the friction is usually very small. In speed regulation applications, the indirect FOC strategy is usually applied along with a PI speed loop. This control strategy is described by the equations u1 = cˆ 1
u3 u2
(13.57)
u2 = u02
(13.58)
u3 = kp (ωref − ω) + ki
t 0
(ωref (η) − ω(η))dη.
(13.59)
where cˆ 1 is an estimate for the inverse rotor time constant; c1 , kp , and ki are the gains of the PI speed controller; ωref is the constant reference velocity; and u02 is the constant desired value of the rotor flux norm.
We define κ = cˆ 1 /c1 as a degree of tuning in the estimation of the rotor time constant. The closed-loop system (13.54)–(13.56) with the control (13.58)–(13.60) is a fourth-order system that can be expressed as x˙ 1 = −c1 x1 +
κc1
x˙ 2 = −c1 x2 −
κc1
u02 u02
x2 x4 + c2 u02
(13.60)
x1 x4 + c2 x4
(13.61)
x˙ 3 = −c4 [c5 (x1 x4 − x2 u02 ) − τL ]
(13.62)
x˙ 4 =
(13.63)
ki x3 − kp c4 [c5 (x1 x4 − x2 u02 ) − τL ]
where the new state variables x3 = ωref − ω and x4 = u3 .
0882-Perruquetti-ch13_R2_290705
References
501
References 1. B.K. Bose, Power Electronics and AC Drives, Prentice Hall, 1986. 2. S.M. Chhaya, Expert system based automated design of AC drive systems, PhD. Dissertation, University of Tennessee, Knoxville, 1995. 3. W. Leonhard, Control of Electrical Drives, Springer-Verlag, Berlin, 1985. 4. R. Ortega, A. Loria, P.J. Nicklasson, and H. Sira–Ramirez, Passivity–based control of Euler–Lagrange systems, Springer-Verlag, Berlin, Commun. Contr. Eng., 1998. 5. A.S. Bazanella and R. Reginatto, Robustness margins for indirect field-oriented control of induction motors, Proceedings of the 37th CDC, Tampa, Florida, 1998. 6. P.A.S. de Wit, R. Ortega, and I.M.Y. Mareels, Indirect field-oriented control of induction motors is robustly globally stable, Automatica, 32 (10), 1393–1402, 1996. 7. A.S. Bazanella, R. Reginatto, and R. Valiati, On Hopf bifurcations in indirect field oriented control of induction motors: designing a robust PI controller, Proceedings of the 38th CDC, Phoenix, Arizona, 1999. 8. E.H. Abed, H.O. Wang, and A. Tesi, Control of bifurcations and chaos, in The Control Handbook, W.S. Levine, Ed., IEEE Press, 1996, pp. 951–966. 9. J. Alvarez, E. Curiel, and F. Verduzco, Complex dynamics in classical control systems, Syst. Control Lett., 31, 1997, pp. 277–285. 10. J. Aracil, K. Åström, and D. Pagano, Global bifurcations in the Furuta pendulum, NOLCOS’98, Enschebe, The Netherlands, 1998, pp. 35–40. 11. J. Llibre and E. Ponce, Global first harmonic bifurcation diagram for odd piecewise linear control systems, Dyn. Stabil. Syst., 11 (1), 1996, 49–88. 12. S.H. Strogatz, Nonlinear Dynamics and Chaos, Addison-Wesley, 1995. 13. J. Hale and H. Koçak, Dynamics and Bifurcations, Springer-Verlag, 1991. 14. Y.A. Kuznetsov, Elements of Applied Bifurcation Theory, Springer-Verlag, 1995. 15. J. Moiola and G. Chen, Hopf Bifurcation Analysis: A Frequency Domain Approach, World Scientific, 1996. 16. W.M. Liu, Criterion of Hopf bifurcations without using eigenvalues, J. Math. Anal. Appl., 182, 250–256, 1994. 17. M. Basso, R. Genesio, and A. Tesi, A frequency method for predicting limit cycle bifurcations, Nonlinear Dyn., 13, 339–360, 1997. 18. R. Genesio and A. Tesi, Harmonic balance methods for the analysis of chaotic dynamics in nonlinear systems, Automatica, 28 (3), 531–548, 1992. 19. A.R. Bergen, L.O. Chua, A.I. Mees, and E.W. Szeto, Error Bounds for General Describing Function Problems, IEEE-CAS, 29 (6), 345–354, 1982. 20. A.I. Mees, Dynamics of Feedback Systems, Wiley, 1981. 21. R.G. Bartle and D.R. Sherbert, Introduction to Real Analysis, John Wiley and Sons, New York, 1982. 22. P.A. Cook, Nonlinear Dynamical Systems, 2nd ed., Prentice Hall, 1994.
0882-Perruquetti-ch13_R2_290705
502
Indirect Field-Oriented Control of Induction Motors
23. F. Bonani and M. Gilli, Analysis of stability and bifurcations of limit cycles in Chua’s circuit through the Harmonic-Balance method, IEEE Trans. Circuits Syst., 46 (8), 881–890, 1990. 24. F. Salas, T. Alamo, and J. Aracil, Detecting periodic orbits in nonlinear systems, XIX Jornadas de Automática, in Spanish, Madrid, pp. 99–104, 1998.
0882-Perruquetti-ch14_R2_170805
14 Implementation of the Chua’s Circuit and its Application in the Data Transmission L. Boutat-Baddas, J.P. Barbot, and R. Tauleigne
CONTENTS 14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.2 Chua’s Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . 14.2.1 Realization of the Non-linear Dipole . . . . 14.3 Observer and Synchronization . . . . . . . . . . . . . . 14.3.1 Linearizable Error Dynamics Case . . . . . . 14.3.2 Step-by-Step Sliding Mode Observer . . . . 14.3.2.1 Simulation Results . . . . . . . . . . . 14.3.3 Output Conditions for Observer Design . 14.3.3.1 Simulation Results . . . . . . . . . . . 14.4 Transmission by Chaotic Parameter Modulation 14.4.1 Simulation Results . . . . . . . . . . . . . . . . . 14.4.2 Data Transmission Examples . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
504 505 506 508 510 511 512 515 515 517 521 521 524
In this chapter we highlight the efficiencies of the method proposed in chapter 9. For this, we describe the realization of an electric circuit with chaotic behavior. This circuit proposed by Chua, contains a non linear resistance decomposed in five segments. In this context, we are interested by the observers design, in order to synchronize two chaotic systems, with the aim of application to protection of data transmission. In the first part of this chapter, we introduce the Chua’s circuit and present the methodology for constructing a nonlinear resistor and discuss the experimental and simulation results of the Chua’s circuit. In the second part, we synchronize two Chua’s circuits through two output variables. The first one allows a linearization of the observation error dynamics whereas the second one does not. Finally, we develop a method of chaotic transmission by parameter modulation of the Chua’s circuit. Different programs and simulations are available [27]. 503
0882-Perruquetti-ch14_R2_170805
504
14.1
Implementation of the Chua’s Circuit and its Application in the Data
Introduction
Since 1983, in the electronic circuits domain, Chua questions about chaos and the synchronization, which he approaches with piecewise linear electrical circuits [25]. Some years later, Pecora and Carroll clarified this approach [13, 14]. In 1990, Parlitz proposed the coupling of two identical strange attractors with a purpose to demonstrate the possibility of masking a confidential message by stacking it in a chaotic signal, and to assure its recovery after reception. This application is based on the synchronization of two chaotic systems, produced with almost identical circuits (see Figure 14.1). In this chapter we adopt an approach based on the inclusion of information in the chaotic system structure (transmitter). Consequently, information does not evolve separately from chaos, instead it will be constantly handled by the system dynamics. This approach is called chaotic parameter modulation [23, 24, 26] (shown in Figure 14.2).
Message Message "BONJOUR" "BONJOUR"
Message Message "BONJOUR" "BONJOUR"
-Chaotic Chaotic generator generator
++
Chaotic Chaotic generator generator
Public Channel Channel
Receiver
T ransmitter Transmitter Chaotic signal signal
Chaotic Chaotic signal signal FIGURE 14.1 Additive chaos masking.
Message: M
Chaotic system Transmitter
FIGURE 14.2 The chaotic parameter modulation.
Transmission Line
Chaotic system Receiver
Message emitted M
0882-Perruquetti-ch14_R2_170805
14.2
Chua’s Circuit
505
The process of deciphering using the method one proposes consists in observer design with unknown input (here the message); allowing to recover the confidential message from the only information emitted by the transmitter to the receiver. However, a question arises, namely, how does one design an observer for the nonlinear systems with singularity observability? We have chosen the sliding modes observers to increase the busy band of the message and to take into account the structural changes of the system. Indeed, the loss of observability implies a change in the structure of the observer, which becomes, at the critical moment, an estimator that does not use bad information. The sliding modes observers have the advantages of converging at finite time when the system is observable, passing in a structure possessing a part without the return of information when the system is unobservable (estimator) and hanging on account of limited perturbations. This, allows us to be more close to stemming the constraints of nonlinear functions and of perturbations because it is the only type of observer which verifies the observability matching condition. We have introduced the same concept for observability [3] (singularity observability) and we naturally recover some properties as universal inputs [6], resonant terms [21] and so on.
14.2
Chua’s Circuit
We can consider the Chua’s circuit as an evolution of Van der Pol’s model, to which an RC circuit is added (Figure 14.3). Similarly, it contains a parallel resonator and a nonlinear resistance. Figure 14.4, gives explicitly the nonlinear current–voltage characteristic of the negative resistance. To realize this negative resistance, Chua proposed an active circuit specially designed for this purpose [15]. For the purpose of education, we preferred to realize this dipole with the more available components (operational amplifiers) [16]. Ro
L
FIGURE 14.3 Chua’s circuit.
R
i3
C2
V2
C1
V1
f(V1)
0882-Perruquetti-ch14_R2_170805
506
Implementation of the Chua’s Circuit and its Application in the Data f(V1)
Gb Ga Bp
–Bp
Gb
FIGURE 14.4 Current–voltage characteristic of the negative resistance.
14.2.1
Realization of the Non-linear Dipole
With an operational amplifier, it is simple to obtain an effect of negative resistance (see Figure 14.5). The value of the negative resistance depends on the gain of the amplifier, and the effect stops when the output voltage reaches the supply voltage. The theoretical value of the negative resistance is: RN =
Id R1 · R 3 =− Vd R2 R3
I
+ –
V R2 R1
FIGURE 14.5 Elaboration of a negative resistance.
0882-Perruquetti-ch14_R2_170805
14.2
Chua’s Circuit
R3
R6
I
507
+
+
–
–
I
V
V R4
R5
R1
R2
FIGURE 14.6 The negative resistance with double slope.
We realized two negative resistances according to this scheme connected in parallel manner (see Figure 14.6). This superposing leads to four different values for the resistances, of which two are negative, because the saturation of amplifiers does not take place at the same input voltage. The change of slope in positive parts is unimportant for our study because chaotic behavior does not investigate these parts. In the oscilloscope, we verify the value of the obtained slopes (Figure 14.7). We also observe an effect of hysteresis inherent to the
FIGURE 14.7 Real current–voltage characteristic.
0882-Perruquetti-ch14_R2_170805
508
Implementation of the Chua’s Circuit and its Application in the Data
R4 Vc2
L
C2
R
R1
Vc1
C1 R6
R5
R3
R2
Rn FIGURE 14.8 Complete implementation of the Chua’s circuit.
mechanisms of saturation and the other imperfections of the operational amplifiers. Our final realization of Chua’s circuit is shown in Figure 14.8. The values used are: L = 18.8 mH , C1 = 10 nF, C2 = 100 nF, R is a potentiometer of 5 K and R1 = 2.2 K, R2 = R3 = 220 , R4 = 3.3 K, R5 = R6 = 22 K. It is sufficient to modify the value of a single component to investigate the various modes of this implementation (Figure 14.8). We take R, as the control parameter. With R close to 5 k, in the infinite limit, negative resistance cannot supply the energy to the resonator, hence no permanent oscillation is possible. For R = 0, we have a Van der Pol oscillator with a negative resistance, and a unique oscillation frequency. Between these two extreme values, and decreasing R, we observe the following phenomena (see Figure 14.9).
14.3
Observer and Synchronization
The problem of a nonlinear observer design with linearization of the observation error dynamics for a class of nonlinear systems, called the output injection form, has been widely investigated. Some necessary and sufficient conditions to obtain such a form are given in [8]. Using this form, it is “easy” to design an observer. Unfortunately, geometric conditions to obtain this form are very often too restrictive with respect to the system considered. In this section, we design an observer for the well-known Chua’s circuit. We choose the following dynamical variables: •
v1 : the voltage across capacitor C1
0882-Perruquetti-ch14_R2_170805
14.3
Observer and Synchronization
509
FIGURE 14.9 Route to chaos. •
v2 : the voltage across capacitor C2
• i3 :
the current through the inductor L
Then, according to Kirchoff’s laws:
v2 − v 1 − f (v1 ) R dv2 1 v1 − v 2 = + i3 dt C2 R
1 dv1 = dt C1
di3 1 = (−v2 − R0 i3 ) dt L
(14.1)
0882-Perruquetti-ch14_R2_170805
510
Implementation of the Chua’s Circuit and its Application in the Data
with: f (v1 ) = Gb v1 + 0.5(Ga − Gb )(|v1 + E| − |v1 − E|).
Setting x1 = v1 , x2 = v2 and x3 = i3 and x = (x1 , x2 , x3 )T , we obtain:
dx1 f (x1 ) −1 = (x1 − x2 ) + dt C1 R C1 1 dx2 x3 = (x1 − x2 ) + dt C2 R C2
(14.2)
−1 dx3 = (x2 + R0 x3 ) dt L
14.3.1
Linearizable Error Dynamics Case
To observe chaotic synchronization, we realized a second Chua’s circuit. First, we adjust the value of R in the first circuit, which is called the transmitter, in order to obtain the double scroll. Before coupling it to the second circuit, which is called receiver, we adjust the control of the receiver parameter (R) to also obtain the double scroll. The two circuits are then capable of working in their chaotic mode (double scroll). Of these, only one makes the coupling of two circuits (Figure 14.10). According to Parlitz’s idea [4], the coupling is not bidirectional. The break of symmetry in energy exchange is due to the two operational amplifiers.
L
+
R
R0
V2
C2
–
C1
f(v1)
V1
R
Transmitter R0
+
R
–
L
C2
V2
Receiver
FIGURE 14.10 Parlitz’s experience.
C1
V1
f(v1)
0882-Perruquetti-ch14_R2_170805
14.3
Observer and Synchronization
511
Let the output be y at state x1 . Setting −1 C1 R 1 A= C R 2 0 we have
1 C1 R −1 C2 R −1 L
0
1 , C2 −1 LR0
1
C 1 − rang CA = C1 R CA2 1 1 + 2 2 2 R C1 C2 R C1
C= 1
−
1 R2 C12
0
0
0
0
1 C1 R
0
−
1 R2 C
1 C2
1 RC1 C2
Then the system (14.2) is globally weakly observable [7] and linearizable by output injection. Then, there exists many observers for this system. To our knowledge, the first classical one was proposed by Parlitz [12]: f (ˆy) dˆx1 −1 = yˆ − xˆ 2 + dt C1 R C1 1 y − xˆ 2 dˆx2 = + xˆ 3 dt C2 R
(14.3)
dˆx3 1 = −ˆx2 − R0 xˆ 3 dt L y = x1 where, xˆ = (ˆx1 , xˆ 2 , xˆ 3 )T is the estimate state of x and yˆ is the estimate output. Since then the receiver design has been changed and has become more closed to observer design [10].
14.3.2
Step-by-Step Sliding Mode Observer
Throughout this chapter we will use a step-by-step sliding mode observer [1, 17]. This kind of observer is very useful and is developed for various reasons: •
To work with reduced observation error dynamics
•
For a finite time convergence of all components of the observable states
0882-Perruquetti-ch14_R2_170805
512
Implementation of the Chua’s Circuit and its Application in the Data
•
Robustness under parameter variations is possible, if a specific condition (dual of the well-known matching condition) is verified
To do this, we provide such a kind of observer for system (14.2) with y = x1 as output. xˆ 2 − y − f (y) + λ1 sign(y − yˆ ) R 1 y − x˜ 2 dˆx2 = + xˆ 3 + E1 λ2 sign(˜x2 − xˆ 2 ) dt C2 R
dˆx1 1 = dt C1
(14.4)
1 dˆx3 = (−˜x2 − R0 x˜ 3 ) + E2 λ3 sign(˜x3 − xˆ 3 ) dt L y = x1 where sign denotes the usual sign function. With the following conditions: if xˆ 1 = x1 then E1 = 1 else E1 = 0 and if [ˆx2 = x˜ 2 and E1 = 1] then E2 = 1 else E2 = 0. Moreover, we define the following auxiliary states: x˜ 2 = xˆ 2 + E1 C1 Rλ1 sign(y − yˆ ) x˜ 3 = xˆ 3 + E2 C2 Rλ2 sign(˜x2 − xˆ 2 ) The proof of observation error convergence is a particular case of the proof in the last section of this paper. REMARK 1
In practice, we add some law pass filter to the auxiliary state x˜ i and we set Ei = 1 for i ∈ {1, 2}, not exactly when we are on the sliding surface but when we are close enough.
14.3.2.1
Simulation Results
Comparing the generalized phase plane of x1 , x2 (system (14.2)) and xˆ 1 , xˆ 2 (system (14.3) dashed line) Figure 14.11, with the generalized phase plane of x1 , x2 (system (14.2)) and xˆ 1 , xˆ 2 (system (14.4) dashed line) Figure 14.12, we note that the state of classical observer (system (14.3)) converges more quickly than the state of the step-by-step observer (system (14.4)). This was confirmed by Figure 14.13 and Figure 14.14, where the observation error was shown for the classical and the step-by-step observer respectively.
0882-Perruquetti-ch14_R2_170805
14.3
Observer and Synchronization
513
4 (x1,x2) (x1obs,x2obs)
3 2 1 0 –1 –2 –3 –6
–4
–2
0
2
4
6
8
10
12
FIGURE 14.11 Double scroll attractor for system (14.2) and system (14.3).
4 (x1,x2) (x1obs,x2obs)
3 2 1 0 –1 –2 –3 –4
–3
–2
–1
0
1
FIGURE 14.12 Double scroll attractor for system (14.2) and system (14.4).
2
3
4
0882-Perruquetti-ch14_R2_170805
514
Implementation of the Chua’s Circuit and its Application in the Data 10 e1 = x1–x1obs
5 0 –5 –10 0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
4 e2 = x2–x2obs
2 0 –2 –4
0
0.002
0.004
0.006
0.008
0.01
0.01 e3 = x3–x3obs
0.005 0 –0.005 –0.01 0
0.002
0.004
0.006
0.008
0.01
FIGURE 14.13 Observation error for system (14.2) and system (14.3). 2 e1 = x1–x1obs 1 0 –1 0
0.002
0.004
0.006
0.008
0.01
4 e2 = x2–x2obs
2 0 –2 –4
0
0.002
0.004
0.006
0.008
0.01
0.01 e3 = x3–x 3obs
0.005 0 –0.005 –0.01 0
0.002
0.004
0.006
0.008
0.01
FIGURE 14.14 Observation error for system (14.2) and system (14.4).
0882-Perruquetti-ch14_R2_170805
14.3
Observer and Synchronization
14.3.3
515
Output Conditions for Observer Design
The linearization by output injection [8, 9] is a usual tool to design an observer and consequently to resolve the synchronization problem. This approach to synchronization is valid if the nonlinearity of a system depends only on the output. However, by considering another output, it is possible under some conditions to design a step-by-step sliding mode observer [1, 17, 22] in spite of the fact that linearization by output injection is not possible. Following the introduction of the concept of a generalized output injection form [2, 18], a very interesting relationship between a chaotic system and a generalized Hamiltonian system was identified [19]. Unfortunately, considering Equation (14.2), with x3 as output instead of x1 , nonlinearity is not a function of the output and the result regarding output injection [2, 18, 19] cannot be used to design an observer. Nevertheless, the observer matching condition [17] was verified (i.e., the nonlinearity f (x1 ) is in ker(C, CA). Therefore, it is possible to design the following step-by-step sliding mode observer: x˜ 2 − xˆ 1 − f (˜x1 ) + E2 λ1 sign(˜x1 − xˆ 1 ) R dˆx2 1 xˆ 1 − x˜ 2 = + x3 + E3 λ2 sign(˜x2 − xˆ 2 ) dt C2 R dˆx3 1 = −ˆx2 − R0 x3 + λ3 sign(x3 − xˆ 3 ) dt L y = x3
1 dˆx1 = dt C1
(14.5)
with the following conditions: if x3 = xˆ 3 then E3 = 1 else E3 = 0, and if [˜x2 = xˆ 2 and E3 = 1] then E2 = 1 else E2 = 0. Moreover by definition: x˜ 2 = xˆ 2 − E3 Lλ3 sign(x3 − xˆ 3 ) x˜ 1 = xˆ 1 + E2 C2 Rλ2 sign(˜x2 − xˆ 2 ) The observation error convergence was also similarly proved as in the last section. 14.3.3.1 Simulation Results Figure 14.15 and Figure 14.16 highlight the efficiency of the step-by-step observer for the system (14.2) with x3 as the output. It is observed that the simulation results are very close to the one previously obtained with x1 as the output.
0882-Perruquetti-ch14_R2_170805
516
Implementation of the Chua’s Circuit and its Application in the Data 1 (x1,x2) (x1obs,x2obs)
0.8 0.6 0.4 0.2 0 –0.2 –0.4 –0.6 –0.8 –4
–3
–2
–1
0
1
2
3
4
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
0.012
0.014
0.016
0.018
0.02
FIGURE 14.15 Double scroll attractor for system (14.2) and system (14.5).
5
x10–3 e3 = x3–x3obs
0 –5 –10
0
0.002
0.004
0.006
0.008
0.01
0.5 e2= x2–x2obs 0 –0.5 –1
0
0.002
0.004
0.006
0.008
0.01
2 e1= x1−x1obs
1 0 –1 0
0.002
0.004
0.006
0.008
0.01
FIGURE 14.16 Observation error for system (14.2) and system(14.5).
0882-Perruquetti-ch14_R2_170805
14.4
Transmission by Chaotic Parameter Modulation
517
This section can be summarized in to two parts: •
Considering x1 as output, using linearization by output injection [8], it is possible to observe the full state of the Chua’s circuit.
•
Thanks to a step-by-step sliding mode observer, it is also possible to design a full state observer for the Chua’s circuit with a new output x3 . For this output, the system is just observable but not linearizable by output injection.
14.4
Transmission by Chaotic Parameter Modulation
To increase the security of transmission, we propose to add some observability bifurcations at the transmission by synchronization of a chaotic system. Here, we provide an illustrative example: consider system (14.2) with x1 as output but with x4 = 1/L as a new state. The variation of L is the information to be transmitted to the receiver. Moreover, we assume that there exists K1 and K2 such that |x4 | < K1 and |dx4 /dt| < K2 , which means that the information signal and its variations are bounded. Thus, from these assumptions, we obtain the following systems: dx1 −1 f (x1 ) = (x1 − x2 ) + dt C1 R C1 1 dx2 1 = x3 (x1 − x2 ) + dt C2 R C2 dx3 = −(x2 + R0 x3 )x4 dt
(14.6)
dx4 =σ dt y = x1 with σ , as an unknown bounded function (i.e., |σ | < K2 ). This system has one unobservable real mode and using the linear change of coordinate z1 = x1 , z2 = (x1 /C2 R) + (x2 /C1 R), z3 = x3 /C1 C2 R and
0882-Perruquetti-ch14_R2_170805
518
Implementation of the Chua’s Circuit and its Application in the Data
z4 = x4 we obtain: −(C1 + C2 ) f (z1 ) dz1 = z1 + z 2 + dt C1 C2 R C1 dz2 f (z1 ) = z3 + dt C1 C2 R dz3 z 1 z4 z 2 z4 = 2 − − R 0 z3 z4 dt C2 C2 R
(14.7)
dz4 =σ dt y = z1 Equations (14.7) are of the normal form [3] with α = 0 and resonant terms h22 = h23 = 0, h14 = 1/C22 R, h24 = 1/C2 and h34 = −R0 , but with σ as a perturbation and a nonsmooth output injection ( f (z1 )/C1 , f (z1 )/C1 C2 R, 0, 0)T . The observability singularity is given by (z1 /C22 R) − (z2 /C2 ) − R0 z3 = 0, and taking into account this singularity we can design an observer. Nevertheless, as system (14.6) has also a particular structure with x4 = z4 and x3 = C2 C1 R0 z3 , we can design an observer directly on the original state (the physical one). Obviously, the observability singularity is the same, the equation −x2 − R0 x3 = 0 is equivalent to (z1 /C22 R) − (z2 /C2 ) − R0 z3 = 0. So, we will use information contained in the terms −x4 x2 − R0 x4 x3 in order to design a full state observer and recover information on x4 contained in the equation of dx3 /dt. For this, we use the following sliding mode observer: xˆ 2 − y − f (y) + λ1 sign(y − xˆ 1 ) R 1 y − x˜ 2 dˆx2 = + xˆ 3 + E1 λ2 sign(˜x2 − xˆ 2 ) dt C2 R
dˆx1 1 = dt C1
dˆx3 = xˆ 4 (−˜x2 − R0 x˜ 3 ) + E2 λ3 sign(˜x3 − xˆ 3 ) dt dˆx4 = E3 λ4 sign(˜x4 − xˆ 4 ) dt
(14.8)
y = x1 with the following conditions: if xˆ 1 = x1 then E1 = 1 else E1 = 0; similarly if [ˆx2 = x˜ 2 and E1 = 1] then E2 = 1 else E2 = 0; and finally if [ˆx3 = x˜ 3 and E2 = 1] then E3 = 1 else E3 = 0. Moreover, to take into account the observability singularity
0882-Perruquetti-ch14_R2_170805
14.4
Transmission by Chaotic Parameter Modulation
519
(˜x2 + R0 x˜ 3 = 0), we set Es = 1 if x˜ 2 + R0 x˜ 3 = 0 else Es = 0. By definition we take: x˜ 2 = xˆ 2 + E1 C1 Rλ1 sign(y − xˆ 1 ) x˜ 3 = xˆ 3 + E2 C2 λ2 sign(˜x2 − xˆ2 ) x˜ 4 = xˆ 4 −
E 3 Es λ3 sign(˜x3 − xˆ 3 ) (˜x2 + R0 x˜ 3 − 1 + ES )
PROOF Here we implicitly assume that Equation (14.6) has bounded states (i.e., obvious due to energy consideration). Consequently, in the observer, we add saturation on the integrator in order to have a bounded state observer. From these two boundless considerations all λi may be easily chosen as constants [20]. •
First step: Assuming that E1 = 0 (if E1 = 1 we directly move to the next step), the observation error dynamics (e = x − xˆ ) is: de1 e2 = − λ1 sign(x1 − xˆ 1 ) dt C1 R de2 e2 e3 = + dt C 2 R C2 de3 = [x4 (−x2 − R0 x3 )] − [ˆx4 (−ˆx2 − R0 xˆ 3 )] dt de4 =0 dt
Due to the finite time convergence of the sliding mode, there exists τ1 ≥ 0 such that ∀t ≥ τ1 , xˆ 1 = x1 and we move to the next step. ˆ 1 = x1 then E1 = 1 and as e1 = 0 for all t ≥ τ1 then • Second step: As x e˙2 = 0 and consequently, invoking the equivalent vector [20], x˜ 2 = x2 , we obtain de1 e2 = − λ1 sign(x1 − xˆ 1 ) = 0 dt C1 R de2 e3 = − λ2 sign(x2 − xˆ 2 ) dt C2 de3 = [x4 (−x2 − R0 x3 )] − [ˆx4 (−ˆx2 − R0 xˆ 3 )] dt de4 =0 dt Due to the finite time convergence of the sliding mode, there exists τ2 ≥ τ1 ≥ 0 such that ∀t ≥ τ2 , xˆ 2 = x˜ 2 = x2 and we move to the next step.
0882-Perruquetti-ch14_R2_170805
520
Implementation of the Chua’s Circuit and its Application in the Data
•
Third step: As [ˆx2 = x2 and E1 = 1] then E2 = 1 and as e2 = 0 for all t ≥ τ2 then e˙3 = 0 and consequently, invoking the equivalent vector, x˜ 3 = x3 , and we obtain e2 de1 = − λ1 sign(x1 − xˆ 1 ) = 0 dt C1 R de2 e3 = − λ2 sign(x2 − xˆ 2 ) = 0 dt C2 de3 = −(x2 + R0 x3 )e4 − λ3 sign(x3 − xˆ 3 ) dt de4 =0 dt Due to the finite time convergence of the sliding mode, there exists τ3 ≥ τ2 ≥ τ1 ≥ 0 such that ∀t ≥ τ3 , xˆ 3 = x˜ 3 = x3 and we move to the next step.
•
Last step: As [ˆx3 = x3 and E3 = 3] then E3 = 1 and we obtain: de1 e2 = − λ1 sign(x1 − xˆ 1 ) = 0 dt C1 R de2 e3 = − λ2 sign(x2 − xˆ 2 ) = 0 dt C2 de3 = −(x2 + R0 x3 )e4 − λ3 sign(x3 − xˆ 3 ) = 0 dt de4 = Es λ4 sign(˜x4 − xˆ 4 ) dt Therefore, if Es = 1, then e4 converges to zero in finite time, else Es = 0 and the e4 dynamic is frozen (the data acquisition). Nevertheless, the singularity (x2 + R0 x3 ) is local, as the transmitter is chaotic, but enough time was not provided to the singularity to alter the data acquisition substantially.
REMARK 2
Es = 0 not only when there is a singularity but also when we are close to it. To illustrate the efficiency of the method we chose to transmit the following message: L (t) = L + 0.1 sin(100t) ,
with L = 18.8 mH.
0882-Perruquetti-ch14_R2_170805
14.4
Transmission by Chaotic Parameter Modulation
14.4.1
521
Simulation Results
In Figure 14.17 and Figure 14.18, if we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ), we lose the information on x4 for a long time. It was observed that the convergence of the state xˆ 4 of the observer, towards x4 of the original system (14.6) depends on the choice of Es . To have a good convergence it is necessary to take Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ), as we notice in Figure 14.19 and Figure 14.20, contrary to the first two which were realized with too large a neighborhood. We visualize the double scroll of the transmitter and the receiver which are completely synchronized.
14.4.2
Data Transmission Examples
To illustrate the efficiency of the proposed method of ciphering, we consider the secure transmission scheme (Figure 14.2) with the chaotic system (14.6) as transmitter and (14.8 ) as receiver. We carried out computer-based experiments which allowed us to encrypt and decrypt a given file which can be a text, image, or sound. 1 (x1,x2) (x1obs,x2obs)
0.8 0.6 0.4 0.2 0 –0.2 –0.4 –0.6 –0.8 –4
–3
–2
–1
0
1
2
3
4
FIGURE 14.17 Double scroll attracteur for systems (14.6) and (14.8), when we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ).
0882-Perruquetti-ch14_R2_170805
522
Implementation of the Chua’s Circuit and its Application in the Data 1 Es Singularity 0.5 0 –0.5 –1 0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1 x 10–3
53.2 x4 x4obs 53.195 53.19 53.185 53.18
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1 x 10–3
FIGURE 14.18 x4 , xˆ 4 , Es , and the singularity (x2 + R0 x3 ), when we set Es = 0 on a big neighborhood of the singularity manifold (x2 + R0 x3 ). 1 (x1,x2) (x1obs,x2obs)
0.8 0.6 0.4 0.2 0 –0.2 –0.4 –0.6 –0.8 –4
–3
–2
–1
0
1
2
3
4
FIGURE 14.19 Double scroll attractor for systems (14.6) and (14.8), when we set Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ).
0882-Perruquetti-ch14_R2_170805
References
523
1 Es Singularity 0.5 0 –0.5 –1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1 x 10–3
53.2 x4 x4obs 53.195 53.19 53.185 53.18
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1 x 10–3
FIGURE 14.20 x4 , xˆ 4 , Es , and the singularity (x2 + R0 x3 ), when we set Es = 0 on a very small neighborhood of the singularity manifold (x2 + R0 x3 ) .
The encryption and decryption programs were written with the Visual C++ version 6.0. The experimental results showed that the synchronization of both systems (transmitter and receiver) was immediate and the communication result is correct and reliable Figure 14.21).
FIGURE 14.21 Transmission examples.
0882-Perruquetti-ch14_R2_170805
524
Implementation of the Chua’s Circuit and its Application in the Data
References 1. Barbot, J.-P., Boukhobza, T., and Djemai, M., Sliding mode observer for triangular input form, Proceedings of the 35th CDC, Kobe, Japan, 1996. 2. Besançon, G., A viewpoint on observability and observer design for nonlinear system, in New directions in Nonlinear Observer Design, Nimeijer, H. and Fossen, T.I., Lecture Notes in Control and Information Sciences, 244, Springer, 1999, pp. 1–22. 3. Boutat-Baddas, L., Boutat, D., Barbot, J-P., and Tauleigne, R., Quadratic Observability normal form, in Proceedings of the 41st IEEE CDC 01, 2001. 4. Cuomo, K.M., Oppenheim, A.V., and Strogatz, S.H., Synchronization of Lorenz-based chaotic circuit with application to communications, EEE Trans. Circuit Syst., 40, 626–633, 1993. 5. Feldman, U., Hasler, M., and Schwartz, W., Communication by chaotic signals: the inverse system approach, in Proceedings of the IEEE ISCAS, Seattle, 680–683, 1995. 6. Gauthier, J.-P. and Bornard, G., Observability for any u(t) of a class of bilinear systems, IEEE TAC, 26, 922–926, 1981. 7. Hermann, R. and Krener, A.J., Nonlinear contollability and observability, IEEE Trans. on Autom. Contr., 22, 728–740, 1977. 8. Krener, A. and Isidori, A., Linearization by output injection and nonlinear observer, Syst. Control Lett., 3, 47–52, 1983. 9. Krener, A. and Xiao, M.Q. Nonlinear observer design in the Siegel domain through coordinate changes, in Proceedings of the Fifth IFAC Symposium, NOLCOS01, Saint-Petersburg, Russia, 557–562, 2001. 10. Nijmeijer, H. and Mareels, I.M.Y., An observer looks at synchronization, IEEE Trans. on Circuits Syst.-1: Fundam. Theory Appl., 44 (11), 882–891, 1997. 11. Ott, E., Grebogi, C., and Yorke, J.A., Controlling chaotic dynamical systems, in chos: Soviet-American perspectives on nonlinear Science, Campbell, D.K., Ed., American Institute of Physics, New York, 1990, pp. 153–172. 12. Parlitz, U., Chua, L.O., Kocarev, Lj. Halle, K.S., and Shang, A., Transmission of digital signals by chaotic synchronization, Int. J. Bifurca. Chaos, 2 (4), 973–997, 1992. 13. Pecora, L.M. and Carroll, T.L., Synchronizing in chaotic systems, Phys. Rev. Lett., 64, 821–823, 1990. 14. Pecora, L.M. and Carroll, T.L., Synchronizing chaotic circuits, IEEE Trans. Circuit Syst., 38, 453–456, 1991. 15. Cruz, J.M. and Chua, L.O., A CMOS IC nonlinear resistor for Chua’s cicuit, IEEE Trans. Circuits Syst., 39 (12), 1992. 16. Kennedy, M.P., Robust OP amp réalization of Chua’s circuit, Frequenz, 46, 66–80, 1992. 17. Perruquetti, W. and Barbot, J.-P., Sliding Mode control in Engineering, Marcel Dekker, New York Basel, 2002. 18. Plestan, F. and Glumineau, A., Linearization by generalized input output injection, Syst. Contr. Lett., 31, 115–128, 1997.
0882-Perruquetti-ch14_R2_170805
References
525
19. Sira-Ramirez, H. and Cruz-Hernandez, C., Synchronization of chaotic systems: a generalized Hamiltonian systems approach, Int. J. Bifurcat. Chaos, 11 (5), 1381– 1395, 2001. 20. Utkin, V.I., Sliding Modes in Control Optimization, Engineering Series, Springer-Verlag, Berlin-Heidelberg, New York, 1992. 21. Wiggins, S., Introduction to applied nonlinear dynamical systems and chaos, in Texts in Applied Mathematics vol. 2, Springer, New York, 1990. 22. Xiong, Y. and Saif, M., Sliding mode observer for nonlinear uncertain systems, IEEE Trans. Autom. Contr., 46, 2012–2017, 2001. 23. Yang, T. and Chua, L., Secure communication via chaotic parameter modulation, IEEE Trans. Circuit Syst.-I: Fundam. Theory Appl., 43 (9), 817–819, 1996. 24. Yang, T., Wah Wu, C., and Chua, L., Cryptography based on chaotic systems, IEEE Trans. Circuit Syst.–I: Fundamental Theory Appl., 44 (5), 469–472, 1997. 25. Tang, Y.S., Mees, A.I., and Chua, L.O., Synchronisation and Chaos, IEEE Trans. Circuits Syst., 30 (9), 1983. 26. Zhou and Ling, X.T., Problems with the chaotic inverse system encryption approach, IEEE Trans. Circuit Syst.-I: Fundam. Theory Appl., 44 (3), 268–271, 1997. 27. www.ec-lille.fr/lisac
0882-Perruquetti-ch14_R2_170805
0882-Perruquetti-ch15_R2_30805
15 Synchronization of Discrete-Time Chaotic Systems for Secured Data Transmission
I. Belmouhoub and M. Djemai
CONTENTS 15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.2 An Example of Discrete-Time Hyperchaotic Systems . . . . . 15.2.1 Lyapounov Exponents . . . . . . . . . . . . . . . . . . . . . . 15.2.2 Observability Analysis . . . . . . . . . . . . . . . . . . . . . . 15.2.2.1 Linear observability . . . . . . . . . . . . . . . . . . 15.2.2.2 Quadratic observability . . . . . . . . . . . . . . . 15.2.3 Observer Design . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.2.3.1 Computation of x˜ 2 . . . . . . . . . . . . . . . . . . . 15.2.3.2 Computation of xˆ 2+ . . . . . . . . . . . . . . . . . . 15.2.4 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.2.5 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.3 Description of the Transmission Scheme for the DCCIM . . . 15.3.1 The Transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.3.2 The Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.3.3 DOMC for Triangular Systems . . . . . . . . . . . . . . . . 15.3.4 The Deciphering Process . . . . . . . . . . . . . . . . . . . . . 15.3.4.1 Step-by-Step Delayed Reconstructor Design 15.3.4.2 The Deciphering Algorithm . . . . . . . . . . . . 15.3.5 Observability Bifurcations . . . . . . . . . . . . . . . . . . . . 15.4 The Mandelbrot Map for the DCCIM . . . . . . . . . . . . . . . . . 15.4.1 Structural Analysis of the Mandelbrot Map . . . . . . . 15.4.1.1 Bifurcations Diagram . . . . . . . . . . . . . . . . . 15.4.1.2 Lyapounov Exponents . . . . . . . . . . . . . . . . 15.4.1.3 Arnold’s Tongue . . . . . . . . . . . . . . . . . . . . . 15.4.2 Message Deciphering . . . . . . . . . . . . . . . . . . . . . . . 15.4.2.1 The DOMC for the Mandelbrot Application 15.4.2.2 The Step-by-Step Delayed Reconstructor . . . 15.4.3 Bifurcation Extending Function . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
528 528 530 531 531 531 532 532 532 533 533 534 534 535 535 538 539 539 540 541 542 542 543 545 546 546 546 547 527
0882-Perruquetti-ch15_R2_30805
528
Synchronization of Discrete-Time Chaotic Systems for Secured Data
15.5 A Ciphering–Deciphering Software . . . . . . . . . . . . . . . . . . . . . 547 15.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
15.1
Introduction
The use of self-synchronizing chaotic systems for secure communications and data transmission has been an active area of research for the past few years. Although its strength for use in cryptographic type security is under debate, it has been shown that communications privacy can be enhanced by masking signals with chaotic carriers. Given the recent emergence of the so-called “keyless” crypto systems, we conclude that the popularity of chaotic communications is on the rise. These methods are directly threatened by the expansion of computer power and parallel computation development. Consequently, new techniques appeared such as cryptography by chaos. In previous chapters, the exploitation of complex and attractive properties of chaos in promoting the characteristics of communication systems [2, 4, 7, 11, 12] was discussed. In addition, the efficiency of the so-called inclusion method (Chapter 9) in secured transmissions was approached. In this chapter, we illustrate the discrete-time cryptography by chaos based on the inclusion method (DCCIM), with the background of observability normal forms and observability bifurcation analysis. The purpose is to give examples of encoding method based on the use of chaotic systems and the Inclusion method. First, we present an example of chaotic synchronization, which is a capital phenomenon in the realization of a cryptographic application using chaotic processes. Then, we present the description of the transmission scheme for the DCCIM. The illustration of the method will be presented on the basis of the Mandelbrot map. Finally, some ciphering examples and conclusion ends the chapter.
15.2
An Example of Discrete-Time Hyperchaotic Systems Synchronization
In this section, we resume the Burgers map [8] (see Figure 15.1) introduced in Chapter 9. We extend the structural features of this map, to illustrate the
0882-Perruquetti-ch15_R2_30805
15.2
An Example of Discrete-Time Hyperchaotic Systems
529
−0.1
−0.2
−0.3
−0.4 x2 −0.5
−0.6
−0.7
−0.8 0.85
0.9
0.95
1
1.05
1.1
1.15
1.2
1.25
1.3
x1 FIGURE 15.1 Phase portrait of Burgers map.
key-role of the observability normal forms in the synchronization of two hyperchaotic systems. We give, among others, the (numerical) proof of the hyperchaotic nature of this map. REMARK 1
In Figures 15.1 and 15.2, the stars illustrate the discrete behavior of the Burgers map trajectory and the observer trajectory, respectively (each star corresponds to an iteration). However, the straight lines designate the evolution of the orbit during the iterations. We recall the Burgers map equations:
x1+ = f1 (x, p) = (1 + a) x1 + x1 x2 x2+ = f2 (x, p) = (1 − b)x2 − x12
(15.1)
with p = [a, b]T and f (x, p) := [f1 (x, p), f2 (x, p)]T . The output of this map is y = x1 . REMARK 2
All the simulations were performed for the following parameters values a = 0.548 and b = 2.28.
0882-Perruquetti-ch15_R2_30805
530
Synchronization of Discrete-Time Chaotic Systems for Secured Data 2.5 2 1.5 1 x2 observed 0.5 0 −0.5 −1 0.5
1
1.5
2 2.5 x1 observed
3
3.5
FIGURE 15.2 Phase portrait of the observer.
15.2.1
Lyapounov Exponents
We recall that the Lyapounov exponents characterize the behavior of a dynamical system. They measure the speed of exponential divergence of two nearby trajectories which stem from slightly different initial conditions. Therefore, negative Lyapounov exponents indicate stability and in the other case, a chaotic evolution, if the trajectory evolve in a bounded space. The Burgers map possesses three equilibrium points: xe1 = (0, 0),
√ xe2 = ( ab, −a)
√ and xe3 = (− ab, −a)
A Matlab simulation was implemented to compute the Lyapounov exponents (λi (xej ))1≤i≤2,1≤j≤3 (introduced in Chapter 2 in this book) for the three stationary points (xej )1≤j≤3 of the Burgers map according to the following formula [3, 8]: ∀ 1 ≤ i ≤ 2 for 1 ≤ j ≤ 3, λi (xej ) = lim
N−→∞
1 log |qi ( foN (xej , p))| N
(15.2)
0882-Perruquetti-ch15_R2_30805
15.2
An Example of Discrete-Time Hyperchaotic Systems
531
where (qi )1≤i≤2 are the eigenvalues of D( fok (xej , p)), the Jacobian matrix1 of fok evaluated in the equilibrium point xej . For more convenience, we use the following notation: ∀ 1 ≤ j ≤ 3,
λ(xej ) = (λ1 (xej ), λ2 (xej ))
Then, we obtain the following exponents (for N = 105 ): λ(xe1 ) (0.436968, 0.436968) λ(xe2 ) = λ(xe3 ) (0.0989662, 0.0989662) It ensues from positive values of (λi (xej ))1≤i≤2,1≤j≤3 that the Burgers map is hyperchaotic (because unstable) in both directions (1, 0)T and (0, 1)T . REMARK 3
The Wolf, Swinney, and Vastano algorithm [3] may be used, for the computation of Lyapounov exponents. Nevertheless, owing to pedagogical concerns, we prefer to present an easy method for the implementation of (15.2).
15.2.2 15.2.2.1
Observability Analysis Linear observability
The burgers map is linearly observable except in the following straight line: L = {(x1 , x2 ) ∈ 2 /x1 = 0} 15.2.2.2 Quadratic observability The iteration of the output y, gives: y+ = (1 + a) x1 + x1 x2 . Therefore, by derivation, we obtain, the observation matrix2 J(x) of y and y+ , and its determinant is: 1 0 |J(x)| = = x1 1 + a + x 2 x1 1 The Jacobian matrix of the Burgers map is given by:
D( f (x, p)) = 2 J = [dhT d( f ◦ h)T . . . d( f n−1 ◦ h)T ]T . ◦
1 + a + x2 −2x1
x1 1−b
0882-Perruquetti-ch15_R2_30805
532
Synchronization of Discrete-Time Chaotic Systems for Secured Data
It ensures the quadratic observability of the Burgers map when x1 = 0. In the opposite case, we have a local loss of observability in the x2 direction. We conclude that (15.1) is quadratically unobservable in one direction, in L. In the following section, we will show how we can construct a relevant observer, thanks to this observability quadratic normal form and specifically, to the resonant term, x1 x2 . REMARK 4
For the notations, the reader should refer to Remark 8, given in Section 9.6 of Chapter 9.
15.2.3
Observer Design
We propose an observer for system (15.1), allowing to recover the states of the chaotic system, from the measured state x1 . Thus, using delayed corrections on the second observer dynamic, it is possible to ensure the synchronization of the observer with the Burgers map. The first observer dynamic is represented by the following equation: xˆ 1+ = (1 + a) x1 + x1 xˆ 2 15.2.3.1
(15.3)
Computation of x˜ 2
Thanks to the resonant term x1 x2 , the state x˜ 2 is computed. Thus, from the equation (15.3) and the observation error dynamic e1+ = x1+ − xˆ 1+ = y e2 . So, e2− =
e1 , y−
∀ y = 0
Then, throughout the bifurcation straight line L, we cannot compute x˜ 2 . This singularity is by-passed as follows: x˜ 2−
=
xˆ 2− +
if y− = 0
(ˆx2
else
e1 y− )2−
where ε is a constant in the neighborhood of zero. 15.2.3.2
Computation of xˆ + 2
The reconstructed state x˜ 2 (i.e., x˜ 2 = (1 − b)˜x2− − (x1− )2 from the second equation of (15.1)) is implemented in the observer in order to synchronize this last one with the studied chaotic system, so we compute xˆ 2+ , the
0882-Perruquetti-ch15_R2_30805
15.2
An Example of Discrete-Time Hyperchaotic Systems
533
prediction of x˜ 2 (i.e., x2 ), as follows: xˆ 2+ = (1 − b)˜x2 − x12 15.2.4
(15.4)
Simulations
For the simulations, the initial conditions of (15.1) and the observer (15.3), ˆ 0 = [1, 1]T , respectively, where xˆ 2 (0) = (15.4) are X0 = [1.05, −0.66]T and X x˜ 2 (0) = 1. The initial conditions are such that y(0) = 0. So, after one step x˜ 2+ = x2+ then, (ˆx2 )2+ = (x2 )2+ . Consequently from (15.3), after three steps, we obtain (ˆx1 )3+ = (x1 )3+ . 15.2.5
Discussions
The observer (Figure 15.2) synchronizes perfectly with the original system (Figure 15.1) after three iterations. This is confirmed by the finite-time convergence of the observation errors e1 and e2 . In fact, the error dynamic e1 = x1 − xˆ 1 , converges in three iterations, whereas e2 = x2 − xˆ 2 , converges in two steps (Figure 15.3). In this example, we focused our attention on the synchronization of two chaotic systems. However, this observer design may be used in more general context as observer-based control. For this purpose, controllable and observable bifurcations may not be studied separately and a predictor will be requested. 0.5
0
−0.5 e1
e2 −1
−1.5
−2
−2.5
0
1
2
3
4
5
6
7
8
9
FIGURE 15.3 Observation error dynamics on x1 and x2 . A zoom on the first 10 iterations (10 stars).
0882-Perruquetti-ch15_R2_30805
534
Synchronization of Discrete-Time Chaotic Systems for Secured Data
The previous example underlines our reflection that the normal form allows to simplify the structural analysis and generally improves the observer design. This is due to the fact that the normal form has the same observability properties as each element of the equivalent class. Now, let us describe the formalism of the DCCIM technique [1] founded on the synchronization principle.
15.3
Description of the Transmission Scheme for the DCCIM
The transmission scheme considered is a symmetric cryptosystem with private key. The key consists a part or the totality of the chaotic system parameters. This allows to exploit another aspect of the sensibility of such a system. 15.3.1 The Transmitter It is represented by a triangular chaotic system in discrete-time, of the form: x+ = f (x, p) + g(p)m y = x1
(15.5)
where the state vector x ∈ n , the parameters vector (the key) p ∈ m . The variable y is the output of the transmitter. The chaotic generator, f : n+m −→ n and the vector field g : m −→ n are such that, f (x, p) = f1 [(x1 , x2 , p), . . . , fi (x1 , . . . , xi+1 , p), . . . , fn (x1 , . . . , xn , p)]T g(p) = [0, . . . , 0, gn (p)]T The variable m ∈ is the confidential message included in the last dynamic of the ciphering process. Hence, the transmitter is considered as a dynamical system with unknown input m. Consequently, the message deciphering consists in the resolution of the so-called left invariability problem3 by the construction of a discrete-time observer. We will prove later that the DOMC, defined 3 In a usual control scheme, m is on the left side and y is on the right side of the bloc diagram. The objective is to recover the unknown input m of the system (15.5) thanks to output y, thus we employ the expression: left invertibility.
0882-Perruquetti-ch15_R2_30805
15.3
Description of the Transmission Scheme for the DCCIM
535
in Chapter 9 of this book, is a necessary and sufficient condition to solve this problem. In fact, it ensures the existence of a unique solution, in a neighborhood of an equilibrium point xe of the system. REMARK 5
For the sake of simplicity, we consider chaotic systems under triangular form. However, the DCCIM can be generalized to any system verifying the DOMC. On the transmission line, the only information transmitted to the receiver is the data y.
15.3.2 The Receiver It represented by a so-called step-by-step delayed reconstructor. Its task is to recover the confidential message m. REMARK 6
The term “delayed reconstructor” is used because the confidential message is extracted from the observation errors with a delay depending on the dimension n of the chaotic system in which it is implemented.
15.3.3
DOMC for Triangular Systems
For the triangular system (15.5), the DOMC is given by the following criteria. PROPOSITION 1
1. ∀i ∈ {1, . . . , n − 1}, fi (x, p) satisfies almost everywhere in V(xe ) the condition: ∂fi (x, p)
= 0 (15.6) ∂xi+1 where V(xe ) ⊂ n is a neighborhood of xe . 2. The term gn (p) = 0. Because of the triangular structure of system (15.5), J(x, p) is also triangular. Hence, its determinant for x ∈ V(xe ), can be described as follows:
PROOF
det(J(x, p))=n−1 i=1 ϒi (x, p)
0882-Perruquetti-ch15_R2_30805
536
Synchronization of Discrete-Time Chaotic Systems for Secured Data
where
∂f (j)+ (j)+ i ϒi (x, p) = n−i−1 (x , . . . , xi+1 , p) j=0 (j)+ 1 ∂xi+1
It ensues that det(J(x, p)) = 0, if and only if (∂fi /∂xi+1 )(x, p) = 0. Therefore, under this condition and by setting,
Si = x ∈ V(xe )
such that
∂fi (x, p) = 0 ∂xi+1
the bifurcations manifold of (15.5), J is of full rank everywhere in
V(xe )/( ni=1 Si ). This corresponds to the first criterion of the DOMC. We have T ( J T · g)(x, p) = 0, . . . , 0, (x, p) · gn (p) where (x, p) = n−1 i=0
∂fi (n−i−1)+
∂xi+1
(n−i−1)+ (n−i−1)+ x1 , . . . , xi+1 ,p
So, the second DOMC criterion is verified if the term (x, p) · gn (p) = 0
(15.7)
almost everywhere around xe . As (15.6) is satisfied almost everywhere in V(xe ), (15.7) holds if and only if gn (p) = 0.
Example 1
Let us consider the triangular system:4 + x1 = x1 + 2x22 x + = x + x x 3 1 3 2 x3+ = x12 − x32 + 0.5 m y = x1
4 We assume that x = 0. 3
(15.8)
0882-Perruquetti-ch15_R2_30805
15.3
Description of the Transmission Scheme for the DCCIM
537
System (15.8) is linearly unobservable, it satisfies the DOMC if the following conditions are fulfilled: (i) J = [(dy)T , (dy+ )T , (dy++ )T ]T is of rank 3 almost everywhere in the neighborhood of the origin. (ii) Jg = (0, 0, )T in the neighborhood of the origin is a non-null function of x almost everywhere around the origin. Let us prove the first point. We have, dy = dx1 = [1, 0, 0]T dy+ = df1 (x1 , x2 , p) ∂f1 ∂f1 ∂f1 T , , = [1, 4x2 , 0]T = ∂x1 ∂x2 ∂x3 dy++ = df1 (x1+ , x2+ , p) ∂f1 ∂f2 ∂f1 ∂f1 + + = ∂x1+ ∂xi ∂x2 ∂xi
T
1≤i≤3
=
[4x32 (1 + x1 ), 4x2 , 4x3 (1 + x1 )2 ]T
Because ∂f1 /∂x3 = 0 then, ∂f1 ∂f1 ∂f2 (x) = 16x2 x3 (1 + x1 )2 |J(x)| = · · ∂x2 ∂x2+ ∂x3 Hence, J is of rank 3 if and only if ∂f1 /∂x2 = 0 and ∂f2 /∂x3 = 0 (i.e., x2 = 0, resp. 1 + x1 = 0). This illustrates the first result of Proposition 1. Let us define the bifurcations manifolds: ∂f1 S1 = x ∈ V(0) ⊂ 3 such that (x1 , x2 ) = 4x2 = 0 ∂x2 ∂f2 S2 = x ∈ V(0) ⊂ 3 such that (x1 , x2 , x3 ) = 1 + x1 = 0 ∂x3 Then, J is of full rank everywhere in V(0)\(S1 ∪ S2 ). As for the second point, we have T J · g = 0, 0, J · g 3 where (J · g)3 = g3 · (∂f1 /∂x2+ )(x1+ , x2+ ) · (∂f2 /∂x3 )(x1 , x2 , x3 ) = 4x3 (1 + x1 )2
0882-Perruquetti-ch15_R2_30805
538
Synchronization of Discrete-Time Chaotic Systems for Secured Data
If g3 = 0.5 = 0 then, J · g 3 = 0 everywhere in V(0)\(S1 ∪ S2 ). Now, the nonlinear observability is formulated as follows: DEFINITION 1 •
If ∀i ∈ {1, . . . , n}, Si = Ø; system (15.5) is said to be locally nonlinearly observable.
•
If ∀i ∈ {1, . . . , n}, Si is of null measure and if ∃i ∈ I ⊂ {1, . . . , n}, such that Si = Ø; system (15.5) is said to be locally almost everywhere nonlinearly observable.
REMARK 7
According to this definition system (15.5) is locally almost everywhere (i.e., in V(0)\(S1 ∪ S2 )) nonlinearly observable. From the Proposition 1, ensues the following result: COROLLARY 1
If system (15.5) is (almost) everywhere nonlinearly observable; the information m is recovered (almost) everywhere provided gn = 0. PROPOSITION 2
The left invariability problem admits a unique solution m almost everywhere around xe provided the DOMC is satisfied. Sketch of proof Since, the first criterion of the DOMC is satisfied, the states (xl )1≤l≤n are nonlinearly observable (almost everywhere around xe ) and may be computed, by a unique way, in the n − 1 first rows of (15.5). So, in the last row of (15.5), the states vector x is determined, which allow to recover m almost everywhere around xe if and only if gn = 0. We have proved how, under the DOMC, the inclusion of the message m in the transmitter’s last dynamic will make it the last information recovered in the receiver. This, after the transmitter, states computation. Here after, we will describe the way to recover the message by a step-by-step delayed reconstructor.
15.3.4 The Deciphering Process The synchronization between the transmitter and the receiver may be established, after the key exchange and thanks to the transfer of y. Now, the receiver is disposed to recover the message, under the DOMC, thanks to a step-by-step delayed reconstructor, which we describe in the following section.
0882-Perruquetti-ch15_R2_30805
15.3
Description of the Transmission Scheme for the DCCIM
15.3.4.1
539
Step-by-Step Delayed Reconstructor Design
The main idea of our technique is summed up in the following points: 1. The reconstructor dynamics (˜xi , ∀ i ∈ {2, . . . , n}) are computed stepby-step, one after the other. 2. In the reconstructor design, for a fixed iteration k: ˜ i ) is computed with (k − i + 1) delays. • The ith dynamic (i.e., x The (i − 1)th dynamic is used to compute the k − 1 delayed value of the ith dynamic. 3. The n-time delayed value of u, un− is recovered in the last dynamic computed. •
The step-by-step delayed reconstructor is given in different steps described by the algorithm hereafter. So, let us assume that system (15.5) at least, satisfied the DOMC almost everywhere around xe . 15.3.4.2 The Deciphering Algorithm 15.3.4.2.1 Computation of x˜ 2− In this first step, the only available information is y which verifies the equation: y = f1 (y− , x˜ 2− , p) So, according to the implicit function theorem, the dynamic x˜ 2− is extracted from y if and only if ∂f1 /∂x2 = 0 this condition holds in n /S1 . In this case, there exists a differentiable function F1 such that x˜ 2− = F1 (y− , y, p). 2− in order When x− ∈ S1 , x˜ 2− take its last remembered value x˜ 2− := x˜ 2 to overcome this bifurcation. This operation is performed for all the reconstructor dynamics: 15.3.4.2.2 Computation of (˜xi+1 )i− for 2 ≤ i ≤ n − 1 In the previous step (i.e., the ith step), the dynamic (˜xi )(i−1)− was computed at the (k − i + 1)th iteration, which allows to construct (˜xi+1 )i− at the (k − i)th iteration by using: •
The delayed dynamics (˜x2 )i− , . . . , (˜xi )i− .
The delayed output (y)i− . • The observed delayed dynamic: •
(˜xi )(i−1)− = −fi ((y)i− , . . . , (˜xi )i− , (˜xi+1 )i− , p) So, when xi− ∈ n /Si there exists a differentiable function Fi such that (˜xi+1 )i− = Fi ((y)i− , . . . , (˜xi )i− , (˜xi )(i−1)− , p)
0882-Perruquetti-ch15_R2_30805
540
Synchronization of Discrete-Time Chaotic Systems for Secured Data
and for xi− ∈ Si (˜xi+1 )i− := (˜xi+1 )(i+1)− . The isolation of such manifolds is the “key” of the reconstructor design. Recovering of the information mn−
15.3.4.2.3
After the computation of the last (n − 1)-times delayed dynamic (˜xn )(n−1)− , in the last step, the information can be recovered with n delays: mn− =
[(˜xn )(n−1)− − fn ((x1 )n− , . . . , (˜xn−1 )n− , (˜xn )n− , p)] gn
All these steps are performed for each transmission iteration. Our delayed reconstructor is conceived such that, in each iteration, the information is extracted at the nth iteration upstream.
15.3.5
Observability Bifurcations
To tighten up the transmission security, we could either extend the bifurcations manifolds (Si )i∈I or provoke them (see Remark 8). To reach this goal, a so-called “extending functions” is implemented, for i ∈ I, in the transmitter corresponding dynamic, xi : 0 for θi (x1 , . . . , xi+1 , p) = xi else
∂fi ∂x
i+1
≤α
These functions extend the singularities in a neighborhood of the bifurcations manifolds, delimited by a chosen threshold α, such a precision reduces or increases the new bifurcation region. Hence, during a possible decryption attempt, the interceptor ignores the existence of such bifurcation manifold (or at least the threshold value) and tries to observe a large unobservable manifold. By consequence, its decryption algorithm diverge quickly, loosing all possibility to extract the message. REMARK 8
Unlike continuous-time systems, it is difficult to expect, for discrete-time systems if their trajectories jump on the bifurcations manifolds (if ∃ i such that, ∃ k ∈ ℵ for which fok (x, p) ∈ Si ). Consequently, in the secured data transmission context, a function that provoke an observability bifurcation plays also the necessary role of function that extend it. For example, the Rössler map presented in Chapter 9, which can be re-written under the following shape (with f (x, p) := [f1 (x, p),
0882-Perruquetti-ch15_R2_30805
15.4
The Mandelbrot Map for the DCCIM
f2 (x, p), f3 (x, p)]T ): + x1 = f1 (x, p) = a1 x1 (1 − x1 ) + a2 x2 x2+ = f2 (x, p) = b1 .osg.(1 − b4 x3 ) + x3 = f3 (x, p) = c1 x3 (1 − x3 ) − c2 (osg + 1)
541
(15.9)
possesses an observability bifurcation ∂f2 /∂x3 = osg = 0. However, the simulation (performed for N = 104 iterations) results showed that 0 ≤ k ≤ N, for which fok (x, p) ∈ S2 , in fact, −1.4 < osg < −0.5. So, in this case, the bifurcation may be provoked by injecting osg in x2+ and x3+ (we replace in 15.9 osg by osg), in order to add to the security of the transmission. osg for−0.7 < osg < −0.65 osg = 0 else The main idea of our approach: the design of a delayed observer (which we denote here as a reconstructor). This concept was presented in [5, 6, 10], where the authors used the (i − N)-times (N ∈ ℵ) delayed values of the output y in order to observe the ith dynamic. Whereas the delayed reconstructor presented in this chapter take in account not only the delayed values of the output, but also the observed delayed dynamics. But the fundamental difference between both approaches is that the first one is based on a global observer, whereas the DCCIM has the worry to make a detailed local observation; by taking in account the exhibited observability bifurcations. Moreover, the main contribution of this technique is the opportunity to exploit these singularities, which represent a great asset for the cryptosystem. In the next section, we illustrate the DCCIM technique by an application example.
15.4
The Mandelbrot Map for the DCCIM
The ciphering process used in this transmission scheme is a chaotic generator widely studied in the literature: the Mandelbrot map (Figure 15.4). It is described in 2 by the following equations: x1+ = a + b + 2x1 x2 (15.10) x2+ = d + (a + c)x2 + x22 − x12 + m In this example, the private key is composed by the parameters: a and b. The constant d is fixed to 0.291.
0882-Perruquetti-ch15_R2_30805
542
Synchronization of Discrete-Time Chaotic Systems for Secured Data 0.4 0.2 0 −0.2 −0.4 −0.6 −0.8 −1 −0.8
−0.6
−0.4
−0.2
0
0.2
0.4
0.6
FIGURE 15.4 Phase portrait of the Mandelbrot map for a = 0.2, b = −0.7, c = 0.8, and d = 0.291.
REMARK 9
System (15.10) is already under the discrete-time observability normal form given in Chapter 9. REMARK 10
To preserve the chaotic behavior of the transmitter, the message amplitude should be adjusted with one of the Mandelbrot maps (i.e., 10−2 ). To this end, a reducing parameter (depending on the message amplitude) may be introduced in the transmitter. This parameter should be manipulated carefully in the deciphering operation. To exploit in the better sense the features of the Mandelbrot map for the ciphering process, a structural analysis of this one will be achieved.
15.4.1
Structural Analysis of the Mandelbrot Map
The bifurcations diagram of the map according to the parameter, c, of which does not depend the key, will be drawn first. 15.4.1.1 Bifurcations Diagram A qualitative approach by the bifurcations diagram allows to determine the validity domain of the parameter c. Once the key is fixed, we draw this
0882-Perruquetti-ch15_R2_30805
15.4
The Mandelbrot Map for the DCCIM
543
FIGURE 15.5 Three-dimensional bifurcations diagram.
diagram for different values of c (for well-chosen initials conditions). We summarize the main properties deduced as follows: •
The values of c for which the application trajectory is chaotic divide up, on intervals spread between 0.88 and 1.06 (see Figure 15.5).
REMARK 11
The bifurcations diagram is obtained as follows. For each value of c (with 0.8 ≤ c ≤ 1.6), the Mandelbrot map is iterated 10 000 times without drawing (transient period) and we draw the 100 last points of the orbit. •
The application trajectory is periodic for some values of c such as 0.95 and 1 (they are pointed by an arrow in Figure 15.6). For c = 0.95, Figure 15.7, illustrates a periodic behavior of the Mandelbrot map, in some regions of the phase portrait (surrounded in this figure).
•
For values of c < 0.88, the trajectory diverges quickly. However, for c > 1.06, the map possesses an attractor fixed point.
15.4.1.2 Lyapounov Exponents When the parameter c is set up to 0.88, according to previous results, we should obtain at least one unstable Lyapounov exponent [computed from
0882-Perruquetti-ch15_R2_30805
544
Synchronization of Discrete-Time Chaotic Systems for Secured Data
FIGURE 15.6 Bifurcations diagram.
FIGURE 15.7 Mandelbrot map’s phase portrait for c = 0.95.
0882-Perruquetti-ch15_R2_30805
15.4
The Mandelbrot Map for the DCCIM
545
the formula (15.2)]. Simulation results show that the Mandelbrot map has an hyperchaotic behavior for this value. In fact, both exponents are positive (λ1 = 0.1742 and λ2 = 0.1721). In contrast, both exponents are negative when c = 1.5. In this case, the phase portrait contracts and the trajectory converges to a fixed point. 15.4.1.3 Arnold’s Tongue The validity domain of c has been determined, it is now, necessary to establish accurately the validity domain of the key. This is justified on one hand by the worry of a correct ciphering. On the other hand, the aim of this evaluation is to estimate the difficulty of the exhaustive attack by the determination of the maximal region to cover. Provided the knowledge of the necessary time to cover a minimal region and the type of convergence of the algorithm used in this investigation [O ln(N), O(N 2 ), . . . with N the required number of iterations]. Matlab’s simulations allow to estimate the Arnlod’s tongue which corresponds to the couples (a, b) belonging to the domain: [−0.8, 0.25] × [−1, 1] and given in Figure 15.8. These couples are those for which, at least one Lyapounov exponent is positive. REMARK 12
A similar investigation has been carried out in order to estimate the validity domain of the initial conditions. So, for an optimal ciphering, we choose for c = 0.8, x1 (0) = −0.2744,
x2 (0) = −0.452 and the key p = (0.2, −0.7)T .
FIGURE 15.8 Arnold’s tongue for the Mandelbrot map.
0882-Perruquetti-ch15_R2_30805
546 15.4.2
Synchronization of Discrete-Time Chaotic Systems for Secured Data Message Deciphering
Before describing the deciphering process, we check whether system (15.10) satisfies the DOMC. 15.4.2.1 The DOMC for the Mandelbrot Application 15.4.2.1.1 DOMC First Criterion The determinant of J is given by: 1 0 det(J) = = 2y 2x2 2y It ensues that det(J) = 0 for x ∈ 2 /S1 . Hence, the matrix J is of rank 2 everywhere except in S1 . We deduce that system (15.10) is almost everywhere nonlinearly observable with one unobservable mode in the direction of x2 . Thus, when x ∈ S1 , the observability bifurcation manifold: S1 = {x ∈ 2 y = 0} 15.4.2.1.2
DOMC second criterion
In this example, g2 = 1 = 0. So, the second criterion is verified5 and the message is recovered everywhere in 2 /S1 . 15.4.2.2 The Step-by-Step Delayed Reconstructor According to the algorithm performed in Section 15.3.4, the first step is to compute x˜ 2− (the transmitter dynamic x2− reconstructed in the receiver). This dynamic may be observed thanks to the transmitter resonant terms, x2 y. So, y − b − c if y− = 0 − 2y− x˜ 2 = ˜ 2− else x2 We recover the message with two delays, in the second step, as follows: 2− 2− 2 m2− = x˜ 2− − d − (a + c) x˜ 2 − x˜ 2 + (y2− )2 REMARK 13
In a ciphering–deciphering operation, in order to avoid the loss of information in the transient region, we add a temporal sample in the beginning of the message. In this example, two digital words are required. 5 The product matrix vector J T · g = (0, 0, 2y)T .
0882-Perruquetti-ch15_R2_30805
15.5
A Ciphering–Deciphering Software
15.4.3
547
Bifurcation Extending Function
The efficiency of the observability bifurcations in a secured communication has been discussed in Section 15.3.5. In this section, we apply this concept for the Mandelbrot map. Consequently, the observability manifold S1 previously highlighted will be extended6 thanks to the function θ1 . Here, ∂f1 /∂x2 = 2x1 . So, θ1 (x1 ) =
0 x1
if |x1 | ≤ α else
This function replaces the dynamic x1 in the transmitter equations. Hence, when the singularity is detected, the value of x1 will be replaced by zero. By consequence, the singularity domain will be extended to [−α, +α] × . REMARK 14
The threshold is chosen with respect to the chaotic signal amplitude, for the Mandelbrot map, it should not exceed 10−2 . However, this implementation may disturb the transmitter trajectory, which leads to an inaccurate deciphering in the receiver. The proposed solution is to interrupt the transmission when the bifurcation is detected. A fictitious message may be transmitted instead of the original one during the bifurcation phase.
15.5
A Ciphering–Deciphering Software
To experiment the CCMID technique in a secured transmission application, we have developed a software (in C language) for data ciphering and deciphering, such as pictures (Figure 15.9 and Figure 15.10), texts (Figure 15.11), as well as songs. The difficulty that we met during the ciphering–deciphering operation is the considerable increase of the ciphered file size in comparison with the size of the original file (see Figure 15.12 and Figure 15.13). This phenomenon is due to the dynamical feature of the cryptography by chaos. Let us take the example of a text file transmission. On the transmission line, the ciphered information is a real nonperiodic signal, it is represented by floating numbers sequences in double precision (8 bytes). 6 Simulation results show that the Mandelbrot map trajectory reaches the bifurcation manifold S1 . This allows to introduce an extending function. Otherwise, we should use a function to provoke the bifurcation.
0882-Perruquetti-ch15_R2_30805
548
Synchronization of Discrete-Time Chaotic Systems for Secured Data
FIGURE 15.9 The original and recovered picture.
Whereas the original message is constituted of characters sequences, encoded each one, on one byte. Hence, each input character corresponds to eight output characters. This is why the ciphered text is eight times bigger than the original one.
FIGURE 15.10 The ciphered picture.
0882-Perruquetti-ch15_R2_30805
15.5
A Ciphering–Deciphering Software
FIGURE 15.11 An example of ciphering/decifering a text file by the CCMID.
Synchronisation de systèmes chaotiques en temps discret : Application à la cryptographie FIGURE 15.12 Original text.
û2 ?¡´Ì DÕ‰½? ? 5¥Ð ›zÍ]º@K3 †,àOhhr ½ˆóÆ}>, š? %8 ”™Ä¬ Z6 ƳÜbÞ4ËÝ’Tr±YtU2˪Þ. YÕ d=½û6l2 öïÒ4,ÉªÝ †Qâx ?švŸ ÃŒ¥ ðYÂ01½\²Nbrõ¨Ï ? }ÆjÎÉ =?œÚ¹sJ¬ën²ï, çIã!¼½úh Ac&³ Ä? ª8 ??¯ûë ZŒ{*>‡®šíƒŠâp²ð . ã TôU$ ‹ Þ}úÙ«å«Å±LR ?$üú ‚°2‰1ê>‹"ýü…«*E þ GîWø?2‚”Ì ÏF¤øÀ¥Ñ móy%ñè\í?÷ ?j œÄ|Û z`?¸eP” Óhh‰@ Á? Å\? =Ùñ(‡ àF9`G¤þ¥ÒP ? 4O‹Ñº”¹ÌjŒº¨ÉšD² ÛÁ†%V°U.¤‹'pÆWu2ò³jfî?¸? H FIGURE 15.13 Ciphered text (Figure 15.12) by the Mandelbrot map (in simple precision).
549
0882-Perruquetti-ch15_R2_30805
550
Synchronization of Discrete-Time Chaotic Systems for Secured Data
To avoid this problem, we have developed a specific application in order to reach the minimum ratio: (data in clear/ciphered data) allowing a correct ciphering and deciphering. Currently, we are able to reach a minimum ratio equal to four. In other words, we cipher 2 bytes for 8 bytes read. We can even reach a ratio equal to three which corresponds to two ciphered bytes for 6 bytes read. This operation is possible exclusively by using a standard floating type: Real48 (in Delphi language).
15.6
Conclusions
The purpose of this chapter was to present a new algorithm of cryptography by chaos, in discrete time, using mathematical and automatic tools. This algorithm is in line with several experiences conducted through the world. The reader may be interested to know that many works are being carried out actually, in relation with a great European project: the design of a ciphering broadband system exceeding gigabits per second. In particular using completely optic architectures [9]. The chaos made by complex dynamics would serve to generate random digital sequences much more preferrable than the pseudo random computer sequences, used until now. One may enrich these ideas and imagine that the new notions of cryptography by chaos will serve to create private key for classical cryptographic algorithms. Effectively, algorithms founded on chaotic dynamics already exist in classical numerical cryptography and systems generating random numbers by chaotic dynamics were already proposed in quantique cryptography. For example, in March 2001, a ciphering software based on chaos theory appeared on the Internet. This system proposed by a Japanese society, announced a chaotic secrete key equivalent to a numerical key of length 1024 bits.
References 1. I. Belmouhoub, M. Djemaï, and J-P. Barbot, Cryptography by discrete-time hyperchaotic systems, in Proceedings of IEEE CDC 2003, Hawaï, USA, 2003. 2. J. Carrol and S. Martin, The automated cryptanalysis of substitution ciphers, Cryptologia, 10 (4), 193–209, 1986. 3. H. Dang-Vu and C. Delcarte, Bifurcations et chaos, une introduction à la dynamique contemporaine avec des programmes en Pascal, Fortran et Mathamatica, Ellipses, 2000, (in french).
0882-Perruquetti-ch15_R2_30805
References
551
4. M. Henon, A two dimensional mapping with a strange attractor, Commun. Math. Phys, 50, 66–77, 1976. 5. H.J.C. Huijberts, T. Lilge, and H. Nijmeijer, Control perspective on synchronization and the Takens–Aeyels–Sauer reconstruction theorem, Phys. Rev. L, 59 (4), 1999. 6. H.J.C. Huijberts, T. Lilge, and H. Nijmeijer, Nonlinear discrete-time synchronization via extended observers, Int. J. Bifurcation Chaos, 11 (7), 1997–2006, 2001. 7. N. Koblitz, A Course in Number Theory and Cryptography, Springer Verlag, New York, USA, 1987. 8. H.J. Korsch and H.-J. Jodl, Chaos. A Program Collection for the PC, SpringerVerlarg, Berlin, 2nd ed., 1998. 9. L. Larger and J.-P. Goedgebuer, Le chaos chiffrant, Pour Sci., 36, 2002, (in French). 10. T. Lilge, Nonlinear Discrete-Time observers for synchronization problems, LNCIS 244, New Direction in nonlinear Observer Design, 491–510, 1999. 11. D.D. Wheeler, Problem with chaotic cryptosytems, Cryptologia, 13, 243–250, 1989. 12. S. Wiggins, An introduction to applied nonlinear dynamical systems and chaos, Springer, 1990.
0882-Perruquetti-ch15_R2_30805
0882-Perruquetti-Appendix_R2_170805
Appendix A On Ergodic Theory of Chaos
CONTENTS A.1 Introduction . . . . . . . . . A.2 Theoretical Background . A.3 Conclusions . . . . . . . . . References . . . . . . . . . . . . . . .
A.1
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
553 553 558 558
Introduction
With regard to both the mathematical description (as sets of differential equations, discrete maps, etc.) and their (disordered-like) aperiodic behavior, chaotic systems can be viewed as belonging to a particular class located at a virtual crossroad between determinism and randomness. As previously pointed out, numerous chaos control methodologies (such as the OGY method, the Pyragas method, the local H ∞ control method, etc.) rely directly or implicitly on ergodic properties of chaotic systems. In addition to the deterministic viewpoint considered in this book, this short appendix aims at briefly introducing some probabilistic considerations of chaotic motions, through the presentation of some important notions and results intrinsic to the ergodic theory.
A.2
Theoretical Background
According to the purpose of dealing with qualitative and quantitative properties of dynamical systems behaviors, the ergodic theory makes 553
0882-Perruquetti-Appendix_R2_170805
554
On Ergodic Theory of Chaos
extensive use of the concepts and formalism of the measure theory [7]. Let us introduce the formal notion of measure.1 For this purpose, consider a space X of all possible states2 x ∈ X ⊆ Rn related to the iteration k of a (possibly nonlinear) transformation Tk intrinsic to a given discrete time dynamical (possibly chaotic) system. Also consider, over the domain X, a σ -algebra (or σ -field) S, that is, a nonempty collection of subsets of X such that the following hold: 1. The empty set {∅} is in S 2. A ∈ S implies that its complement Ac ∈ S ∞ 3. If {Ai }∞ i=1 Ai ∈ S i=1 is a sequence of elements in S then A measure is a (nonnegative) function µ : S → R satisfying the following properties:
DEFINITION 1
•
µ({∅}) = 0
•
µ(A) ≥ 0
(where {∅} denotes the empty set)
•
For a countable sequence of disjoint sets {Ai }ki=1 with Ai ∈ S and k ∈ N ∪ ∞, we have the following countable additive condition,3
for all A ∈ S
k k µ Ai = µ(Ai ) i=1
(A.1)
i=1
If, in addition, µ(X) = 1, then µ is a probability measure. According to this general definition, there exists an infinite number of possible measures (e.g., the Dirac measure, the Borel measure, the counting measure, the Lebesgue measure, etc.) for a given dynamical system. However, within the context of chaotic systems, some measures such as invariant and ergodic ones are of particular interest. Thus, in what follows, we define such measures via the consideration of transformations [2]. For this purpose, consider two probability spaces (Xi=1,2 , Si=1,2 , µi=1,2 ) where (Xi=1,2 , Si=1,2 ) are measurable spaces, µi=1,2 are probability measures, and σ -algebras Si=1,2 are families of measurable subsets (events) of Xi=1,2 .
1 A measure is a function which assigns lengths, volumes, or probabilities to subsets of a given
set. 2 From a probabilistic or statistical viewpoint, X can be viewed as a sample space, that is, a set
of outcomes, possibly infinite in number. 3 A finitely additive measure has the same definition except that S is only required to be an algebra and the additive property is only required to hold for finite unions.
0882-Perruquetti-Appendix_R2_170805
A.2
Theoretical Background
555
DEFINITION 2 Let (X1 , S1 , µ1 ) and (X2 , S2 , µ2 ) be two probability spaces. A transformation T : X1 → X2 is said to be measurable if T −1 (A) ∈ S1 for every A ∈ S2 . If, in addition, µ1 (T −1 (A)) = µ2 (A) for every measurable set A ∈ S2 , then T is said to be a measure-preserving transformation. In addition, if (X1 , S1 , µ1 ) = (X2 , S2 , µ2 ) then T is a measure-preserving endomorphism. Remark: With respect to this definition, if µ T −1 (A) = µ(A) then µ is said to be T-invariant (i.e., invariant under T). Now, through the consideration of ergodic measures, Definition 2 can be related to ergodic transformations as follows.
A measurable-preserving transformation T : X → X on a probability space (X, S, µ) is said to be ergodic if for every measurable set A ∈ S with T −1 (A) = A, we have µ(A) = 0 or µ(A) = 1.
DEFINITION 3
In such a case, µ is said to be T-ergodic. This last definition states that T acts on almost all sets all over the space except sets of measure zero and the entire space. In other words, a transformation is ergodic if (and only if) the orbit of almost every point visit each set of positive measure. Chaotic systems are often referred to as processes having a mixing property4 [4]. We introduce here some definitions related to this property and some links with ergodic transformations (see Lemma 1 and Lemma 2). Let T : X → X be a measure preserving transformation on a probability space (X, S, µ). Then, T is weak-mixing if for any subsets A, B ∈ S we have,
DEFINITION 4 (weak-mixing)
N
1
µ(T −j A ∩ B) − µ(A)µ(B) = 0 N→+∞ N
lim
(A.2)
j=1
LEMMA 1
If a transformation T : X → X on a probability space (X, S, µ) is weak-mixing then it is necessarily ergodic.5 Let T : X → X be a measure preserving transformation on a probability space (X, S, µ). Then, T is strong-mixing if for any subsets A, B ∈ S, we have,
DEFINITION 5 (strong-mixing)
lim µ(T −j A ∩ B) = µ(A)µ(B)
j→+∞
4 More precisely, an exponentially fast mixing property. 5 But the converse is not true.
(A.3)
0882-Perruquetti-Appendix_R2_170805
556
On Ergodic Theory of Chaos
LEMMA 2
If a transformation T : X → X on a probability space (X, S, µ) is strong-mixing then it is necessarily weak-mixing (and therefore ergodic). Now, with such definitions in mind, we can introduce a fundamental result, known as Poincaré recurrence theorem and express it as follows. THEOREM 1 (Poincaré recurrence theorem)
Let T : X → X be a measurable transformation on a probability space (X, S, µ) and µ a T-invariant finite measure on X. If A ⊂ X is a measurable subset (i.e., A ∈ S) with positive measure (i.e., µ(A) > 0) then card n ∈ N : T n x ∈ A = ∞ (A.4) for µ-almost every point x ∈ A.
This theorem states that any dynamical system preserving a finite measure, exhibits a (nontrivial) recurrence in any set A ∈ S with positive measure, so that the orbit of almost every point in A returns infinitely often to A under the iteration of T. With regard to some (local) chaos control methods (such as the OGY method and the Pyragas technique), Poincaré’s recurrence theorem appears to be of crucial importance, as it guarantees that trajectories of a chaotic systems (with measure-preserving transformations) remain in a bounded region of the state space (without entering within regions with nonpositive measure that are related to the attractor) [3]. However, note that Poincaré’s recurrence theorem is essentially qualitative as it gives no information about the frequency with which each trajectory visits a given set. This lack of information was overcome by Birkhoff [1] and von Neumann [9] who established independently the first version of the ergodic theorem. Before introducing such a fundamental result, the first step in quantifying some aspects of the recurrence theorem is presented. Let nA : A → Z+ ∪ {+∞} be the first return time6 (i.e., nA (x) > 0 is the smallest value for which T nA (x) x ∈ A). Then, if the measure µ is T-ergodic then the average return time to A can be defined according to the following theorem [5]. THEOREM 2 (Kac’s return time theorem)
Let T : X → X be an ergodic transformation on a probability space (X, S, µ). Let A ∈ S have µ(A) > 0 then we define the return time function nA : A → Z+ ∪ {+∞} (which is finite, almost everywhere). The average return time (with respect to the induced probability measure µA ) is
1 (A.5) nA (x)dµA (x) = µ(A) A 6 With respect to Theorem 1, n
A is finite almost everywhere.
0882-Perruquetti-Appendix_R2_170805
A.2
Theoretical Background
557
REMARK 1
For a given (discrete time) ergodic dynamical system, Kac’s theorem gives some quantitative informations about the (statistical) duration to wait to return within any small neighborhood of an original position in the phase space. However, it is worth mentioning that, due to the sensitivity to initial conditions and exponential instability, this return time property cannot be related to “periodical motion” stricto sensu [8]. Finally, to complete this quantitative insight of ergodic properties, express the seminal theorem of Birkhoff.7 THEOREM 3 (Birkhoff’s ergodic theorem)
Let (X, S, µ) be a probability space with µ, an ergodic measure and S, a σ -algebra. Moreover, let f : X → R be a real-valued measurable function. Then for almost all x ∈ X we have,
N 1 f ◦ T j (x) −→ f dµ N
(A.6)
j=1
as N → ∞. The left-hand side of (A.6) just says how often the orbit of x (i.e., the points x, Tx, T 2 x, etc.) lies in A and the right-hand side is just the measure of A. Thus, for an ergodic endomorphism, we have “space-averages = timeaverages almost everywhere.”8 Nevertheless, this theorem considers only one aspect of the quantitative behavior of recurrence. In particular, it gives no information about the rate at which a given trajectory returns arbitrarily close to itself [6]. The following corollary shows that the Birkhoff theorem can also gives a quantitative version of the Poincaré recurrence theorem. COROLLARY 1
Let (X, S, µ) be a probability space, and assume that the transformation T : X → X preserves µ and is ergodic. The proportion of time spent by almost all points in a subset A ∈ S is given by its measure µ(A), that is, 1 card 0 ≤ n ≤ N − 1 : T n x ∈ A = µ(A) N→+∞ N lim
(A.7)
for almost all points x ∈ X. 7 In its version involving ergodic measure. 8 Note that this notion of time-averages is important as it implies that transients become irrelevant.
0882-Perruquetti-Appendix_R2_170805
558
On Ergodic Theory of Chaos
REMARK 2
When dealing with (local) control methodologies for chaotic systems, Poincaré’s recurrence theorem and Birkhoff’s ergodic theorem are of crucial interest. Indeed, these results provide some theoretical tools to focus on some chaotic motion properties such as the filling of some bounded regions of the state space (with respect to the attractor characteristics). Then, such results can serve to ensure that a (chaotic) system trajectory will always visit an expected (small) neighborhood of a state where the control law has to start acting, and that the trajectory will also return, in finite time, to this neighborhood in case of lost of effectiveness of the control law (leading the system evolution to become once more wandering).
A.3
Conclusions
As briefly presented in this appendix, the ergodic theory aims at studying the dynamics of general measurable maps (i.e., transformations) on general measure spaces, by means of concepts and formalism intrinsic to the measure theory [10–12]. In particular, this theoretical framework provides numerous results to understand and describe some probabilistic and statistical properties of some classes of dynamical systems (including chaotic ones), within the context of measure-preserving and ergodic transformations (or invariant and ergodic measures). Such results appear to be of crucial importance for dealing with global behavior of chaotic systems. Indeed, despite the unpredictability of long-term behaviors of such systems, these results provide some probabilities (or even certitudes) of occurrence of some behaviors or events, which may or may not enable the development of some chaos control methodologies within a deterministic context.
References 1. G.D. Birkhoff, Proof of the ergodic theorem, Proc. Natl. Acad. Sci. USA, 17, 656–660, 1931. 2. G.D. Birkhoff, Collected Mathematical Papers, vol. 3, Dover, N.Y., 1960. 3. J.P. Eckmann and D. Ruelle, Ergodic Theory of Chaos and Strange Attractors, Rev. Mod. Phys., 57 (3), 617–656, 1985. 4. J.L. Jensen, Chaotic dynamical systems with a view towards statistics: a review, in Networks and Chaos, Statistical and Probabilistic Aspects, O.E. BarndorffNielsen, J.L. Jensen, and W.S. Kendall, Eds., Chapman and Hall, London, 1993.
0882-Perruquetti-Appendix_R2_170805
References
559
5. M. Kac, On the notion of recurrence in discrete stochastic processes, Bull. Am. Math. Soc., 53, 1002–1010, 1947. 6. A.G. Kachurovskii, The rate of convergence in ergodic theorem, Russ. Math. Survey, 51, 653–705, 1996. 7. A. Katok and B. Hasselblatt, Introduction to Modern Theory of Dynamical Systems, Cambridge University Press, 1995. 8. R. Mañe, Ergodic Theory and Differentiable Dynamics, Springer-Verlag, 1987. 9. J. von Neumann, Proof of the quasi-ergodic hypothesis, Proc. Natl. Acad. Sci. USA, 18, 70–82, 1932. 10. Ya.G. Sinai, Introduction to Ergodic Theory, Princeton University Press, 1977. 11. Ya.G. Sinai, Topics in Ergodic Theory, Princeton University Press, 1994. 12. P. Walters, An Introduction to Ergodic Theory, Graduate Text in Mathematics, vol. 79, Springer, New York, 2000.
0882-Perruquetti-Appendix_R2_170805
0882-Perruquetti-Index_R2_170805
Index
σ -algebra, 554 absolutely continuous, 52 Adaptive Adjustment Mechanism (AAM), 315 addition method, 393 approximates Euler, 56 Picard-Lindelöf, 57 attractivity, 70 attractor, 266 strange, 10, 60, 96, 265 autonomous, 58 Bernoulli relation, 47 bifurcation, 4, 88, 266 codimension, 92 diagram, 90 fork, 94 Hopf, 91, 95, 118, 122, 123, 483, 489 observability, 377 subcritical, 92, 123, 129 supercritical, 123 transcritical, 93 value, 90 Brunovsky form, 349 capacity, 97 Carathéodory, 55 Cauchy problem, 52 Center manifold, 102 chaos, 60, 96 H∞ -control, 302 adaptive control, 304 control, 294 control: OGY method, 294 control: Pyragas method, 299 hyperchaos control, 312 sliding mode control, 306 chemistry, 47 Chua’s circuit, 505
Code Division Multiple Access (CDMA), 454 codimension, 129 commutation of two vector flows, 62 complete vector field, 61 conjugacy, 79 controllable linearly, 348 convex hull, 326 Delay coordinate vector, 298 Dependence of the initial conditions for an ODE, 58 dimension Embedding, 298 fractal, 97 Hausdorff, 97 Liapunov, 97 Rényi, 97 Discrete-time Cryptography by Chaos based on the Inclusion Method (DCCIM), 528 Discrete-Time Hyperchaotic-Cryptography by Inclusion Method, 399 distance Whitney - (or C1), 79 domain stability, 70 Dunford splitting, 76 dynamics fast, 268 slow, 268 eigenvalues, 119, 130 eigenvectors, 115, 116 equation Hindmarsh and Rose, 280 ball and beam, 366 Chua’s circuit, 48, 276, 393 Euler-Lagrange, 49 Liénard, 48 logistic, 47, 53
561
0882-Perruquetti-Index_R2_170805
562 equation (Contd.) Lorenz, 117, 373 Moore-Greitzer model of an engine compressor, 370 nonlinear delay differential (NLDDE), 458 ordinary differential, 5, 46 pendulum, 50 Rössler, 96, 129 Van Der Pol, 48, 66, 114 Volterra-Lotka, 63 equilibrium point, 62 branch, 89 degenerated, 65 point, 4, 102 saddle, 92 sink, 135 source, 135 ergodic measure, 555 ergodic transformation, 555 Euler approximates, 56 exponential stability, 74 Extended Time-Delayed AutoSynchronization method (ETDAS), 301 field-oriented control (FOC), 481 fixed point, 4, 102 Floquet multipliers, 301 Floquet theory, 60 flow, semi-flow, 61 Gronwall lemma, 58 hyperbolic point, 65 hyperchaotic system, 312, 399 Ikeda Ring Cavity, 461 inclusion method, 393 initial condition, 52 integral manifold approach, 263, 272 invariant measure, 555 jacobian, 57 matrix, 65 Jordan curve, 66 Kazantzis-Kravaris Partial Differential Equations, (KK PDE), 411, 412 Kotelianskii criterion, 78
Index lagrangian, 49 Liapunov dimension, 97 exponent, 96, 98 first Liapunov method, 81 number, 123, 129 Parameter Dependent Liapunov Functions, 325 Parameter Dependent Liapunov Functions (PDLF), 329 Lie bracket, 62 limit cycle, 60, 121 limit layer, 270 Linear Matrix Inequalities (LMI), 329, 333 linear parameter varying systems (LPV), 327 linearity, 59 lipschitzian function, 57 Lyapunov function, 378 manifold differentiable, 51 fast, 274 intergral, 267 local unobservability, 391 local, stable, unstable, 82 slow, 274 map Burgers, 397, 529 Controlled Poincaré, 296 Mandelbrot, 541 Myrberg’s, 9 Rössler, 399, 540 matrix exponential, 75 maximum solution, 57 measurable, 52 measurable space, 554 measure-preserving transformation, 555 mixing property, 555 motion, 53 Neimark curve, 18 node, 92 normal form, 130 ball and beam, 367 Bogdanov, 107 controllable, 352 discrete-time observability, 390 Guckenheimer-Holmes, 132
0882-Perruquetti-Index_R2_170805
Index Lorenz, 372 Moore-Greitzer model of an engine compressor, 369 observability, 387 Poincaré-Dulac, 104 Poincaré, 349 Takens, 107 with controllable and uncontrollable parts, 356 observability bifurcation, 378 Discrete-time Observability Matching Condition (DOMC), 393 matching condition (OMC), 392 normal form, 387 observable weakly locally, 382 observer, 411 Kreisselmeier and Engel, 414 unknown input, 335 ODE (ordinary differential equations), 5, 46 Autonomous linear, 59 explicit, 51 implicit, 50 OGY region, 294 orbit, 53 closed, 66 heteroclinic, 66, 266 homoclinic, 66, 266 periodic, 65 order, 50 ordinary differential equation autonomous- (or stationary), 59 linear non autonomous, non stationary, 60 Parameter dependence (for an ODE), 88 Park model, 49 Peano, 55 periodic function, 60 orbit, 65 vector field, 59 phase portrait, 53 space, 51 Picard-Lindelöf approximates, 57
563 Poincaré section, 86 section method, 295 polytope, 326 polytopic, 327 decomposition, 327 observer, 332 probability measure, 554 space, 554 problem boundary, 52 Cauchy, 52 QEMOI see Quadratically Equivalent Modulo an Output Injection QEMOI for a discrete time system, 388 Quadratically Equivalent Modulo an Output Injection (QEMOI), 384 qualitative methods, 4 rank-one image, 11 repeller strange, 10 resonance, 115 robustness, 79 Rössler attractor, 96 set attractive, 71 invariant, 68 singular perturbation, 263 slow model, 270 solution, 52 existence, 53 maximum, 57 space extended state, 53 of motion, 53 state, 51 tangent, 51 stability asymptotic, 72 domain, 69 global, local, 70 Liapunov, 69 poly-quadratic, 329 uniform, 69 standard form, 268 state vector, 51 step by step sliding mode observer, 395
0882-Perruquetti-Index_R2_170805
564 step-by-step delayed reconstructor, 401 stepper motor, 49 strong-mixing property, 555 structural stability, 5, 266 structurally stable, 80 synchronization, 332, 378 Input Independent Global, 336 syntonization, 378 theorem Birkhoff’s ergodic, 557 Carathéodory, 55 center manifold, 83 Dependence of the initial conditions, 58 Gröbner, 269 Hartman-Grobman, 82 Henry and Carr, 84 Kac’s return time, 556 LaSalle, 379
Index Peano, 55 Poincaré recurrence, 556 Poincaré-Dulac, 104 stable manifold, 82 Tikhonov, 272 time variable, 51 Time-Delayed AutoSynchronization method (TDAS), 300 topological equivalence, 80 trajectory, 53 universal unfolding, 130, 132 Unstable Periodic Orbit (UPO), 291 vector field, 51 weak-mixing property, 555 Whitney distance, 79